Max level shown:
12025-03-07T23:29:47.626ZDEBGtest_unauthorized (init_with_steps): Running step start_crdb
22025-03-07T23:29:47.626ZDEBGtest_unauthorized: Starting CRDB
32025-03-07T23:29:47.658ZINFOtest_unauthorized: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpv8VhQC
42025-03-07T23:29:47.658ZINFOtest_unauthorized: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/c7e96add76588bb61c541cdee3e6bde547013a2d7a1922650448109b1aa508ec.tar) to storage directory (/var/tmp/omicron_tmp/.tmpv8VhQC/data)
52025-03-07T23:29:47.677ZINFOtest_unauthorized: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpv8VhQC/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpv8VhQC/listen-url
62025-03-07T23:29:47.678ZINFOtest_unauthorized: cockroach environment: BUILDOMAT_JOB_ID=01JNSA4XTQXS5HVJ4V4KJ66GZY BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/c7e96add76588bb61c541cdee3e6bde547013a2d7a1922650448109b1aa508ec.tar GITHUB_BRANCH=more-manual-pagination GITHUB_REF=refs/heads/more-manual-pagination GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=1005669a265bdb3ebd76577e4c2bae3b77a65e55 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-c4e7c3e6d69869a6/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-9ac0d43087b1884e/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-7ed663b343a5fc8e/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-ba7021cfa9b61307/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-c73ed488508dfaf4/out:/work/oxidecomputer/omicron/target/debug/build/tofino-42eb1c7425b5dc3f/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-c4e7c3e6d69869a6/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-9ac0d43087b1884e/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-7ed663b343a5fc8e/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-ba7021cfa9b61307/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-c73ed488508dfaf4/out:/work/oxidecomputer/omicron/target/debug/build/tofino-42eb1c7425b5dc3f/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.85.0-x86_64-unknown-illumos/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=92a1c789-151d-4318-a1ff-9e6f747775af NEXTEST_TEST_GLOBAL_SLOT=0 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-0e7d593d36f30d8a/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.85.0-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime __NEXTEST_ATTEMPT=1
72025-03-07T23:29:49.108ZINFOtest_unauthorized: cockroach pid: 26672
82025-03-07T23:29:49.109ZINFOtest_unauthorized: cockroach listen URL: postgresql://root@[::1]:51792/omicron?sslmode=disable
92025-03-07T23:29:49.109ZDEBGtest_unauthorized (init_with_steps): Running step start_clickhouse
102025-03-07T23:29:49.109ZDEBGtest_unauthorized: Starting Clickhouse
112025-03-07T23:29:49.684ZDEBGtest_unauthorized (init_with_steps): Running step start_gateway_switch0
122025-03-07T23:29:49.684ZDEBGtest_unauthorized: Starting Management Gateway
132025-03-07T23:29:49.811ZDEBGtest_unauthorized (init_with_steps): Running step start_dendrite_switch0
142025-03-07T23:29:49.812ZDEBGtest_unauthorized: Starting Dendrite for switch0
152025-03-07T23:29:49.852ZDEBGtest_unauthorized (init_with_steps): Running step start_mgd_switch0
162025-03-07T23:29:49.852ZDEBGtest_unauthorized: Starting mgd for switch0
172025-03-07T23:29:49.938ZDEBGtest_unauthorized: mgd port is 49873
182025-03-07T23:29:49.938ZDEBGtest_unauthorized (init_with_steps): Running step record_switch_dns
192025-03-07T23:29:49.938ZDEBGtest_unauthorized: Recording DNS for the switch zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 switch_location = switch0
202025-03-07T23:29:49.939ZDEBGtest_unauthorized (init_with_steps): Running step start_internal_dns
212025-03-07T23:29:49.939ZINFOtest_unauthorized (store): opening sled database path = /var/tmp/omicron_tmp/.tmppdVvjg
222025-03-07T23:29:50.140ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
232025-03-07T23:29:50.140ZINFOtest_unauthorized (store): pruning trees for generations older than 0 keep = 3
242025-03-07T23:29:50.140ZINFOtest_unauthorized (dns): DNS server bound to address kind = dns local_address = [::1]:41651
252025-03-07T23:29:50.141ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:48967 method = GET path = /config versions = all
262025-03-07T23:29:50.141ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:48967 method = PUT path = /config versions = all
272025-03-07T23:29:50.141ZINFOtest_unauthorized (http): listening kind = dns local_addr = [::1]:48967
282025-03-07T23:29:50.142ZDEBGtest_unauthorized (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:48967
292025-03-07T23:29:50.142ZDEBGtest_unauthorized (init_with_steps): Running step start_external_dns
302025-03-07T23:29:50.142ZINFOtest_unauthorized (store): opening sled database path = /var/tmp/omicron_tmp/.tmpzYUxFA
312025-03-07T23:29:50.159ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
322025-03-07T23:29:50.160ZINFOtest_unauthorized (store): pruning trees for generations older than 0 keep = 3
332025-03-07T23:29:50.160ZINFOtest_unauthorized (dns): DNS server bound to address kind = dns local_address = [::1]:46231
342025-03-07T23:29:50.160ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:39729 method = GET path = /config versions = all
352025-03-07T23:29:50.160ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:39729 method = PUT path = /config versions = all
362025-03-07T23:29:50.160ZINFOtest_unauthorized (http): listening kind = dns local_addr = [::1]:39729
372025-03-07T23:29:50.163ZDEBGtest_unauthorized (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:39729
382025-03-07T23:29:50.163ZDEBGtest_unauthorized (init_with_steps): Running step start_nexus_internal
392025-03-07T23:29:50.163ZDEBGtest_unauthorized: Starting Nexus (internal API)
402025-03-07T23:29:50.164ZINFOtest_unauthorized: setting up nexus server
412025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = Action
422025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = AnyActor
432025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = AuthenticatedActor
442025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = BlueprintConfig
452025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = Database
462025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = DnsConfig
472025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = Fleet
482025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = Inventory
492025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = IpPoolList
502025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = ConsoleSessionList
512025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAuthRequestList
522025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloCertificateList
532025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloIdentityProviderList
542025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloUserList
552025-03-07T23:29:50.167ZINFOtest_unauthorized (ServerContext): registering Oso class class = TargetReleaseConfig
562025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Project
572025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Disk
582025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Snapshot
592025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = ProjectImage
602025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = AffinityGroup
612025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = AntiAffinityGroup
622025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Instance
632025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = IpPool
642025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = InstanceNetworkInterface
652025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Vpc
662025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = VpcRouter
672025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGateway
682025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGatewayIpPool
692025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGatewayIpAddress
702025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = RouterRoute
712025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = VpcSubnet
722025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = FloatingIp
732025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Image
742025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloImage
752025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = AddressLot
762025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Blueprint
772025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = LoopbackAddress
782025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = Certificate
792025-03-07T23:29:50.168ZINFOtest_unauthorized (ServerContext): registering Oso class class = ConsoleSession
802025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAuthRequest
812025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAccessToken
822025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = PhysicalDisk
832025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = Rack
842025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = RoleBuiltin
852025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = SshKey
862025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = Silo
872025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloUser
882025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloGroup
892025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = SupportBundle
902025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = IdentityProvider
912025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = SamlIdentityProvider
922025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = Sled
932025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = TufRepo
942025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = TufArtifact
952025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = Zpool
962025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = Service
972025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): registering Oso class class = UserBuiltin
982025-03-07T23:29:50.169ZINFOtest_unauthorized (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
992025-03-07T23:29:50.196ZINFOtest_unauthorized (ServerContext): Setting up resolver using DNS address: [::1]:41651
1002025-03-07T23:29:50.196ZINFOtest_unauthorized (DnsResolver): new DNS resolver addresses = [[::1]:41651]
1012025-03-07T23:29:50.196ZINFOtest_unauthorized (ServerContext): Setting up qorb database pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:51792/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 51792,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
1022025-03-07T23:29:50.198ZDEBGtest_unauthorized (ServerContext): registered USDT probes
1032025-03-07T23:29:50.378ZINFOtest_unauthorized (nexus): Database schema version is up to date desired_version = 130.0.0 found_version = 130.0.0
1042025-03-07T23:29:50.818ZDEBGtest_unauthorized (clickhouse-client): registered USDT probes id = 005a5517-1b48-42a5-bbde-75a915de81f0
1052025-03-07T23:29:50.830ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /bgtasks versions = all
1062025-03-07T23:29:50.830ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /bgtasks/activate versions = all
1072025-03-07T23:29:50.830ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /bgtasks/view/{bgtask_name} versions = all
1082025-03-07T23:29:50.830ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /clickhouse/policy versions = all
1092025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /clickhouse/policy versions = all
1102025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request versions = all
1112025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped versions = all
1122025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress versions = all
1132025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish versions = all
1142025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start versions = all
1152025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /demo-saga versions = all
1162025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /demo-saga/{demo_saga_id}/complete versions = all
1172025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /deployment/blueprints/all versions = all
1182025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = DELETE path = /deployment/blueprints/all/{blueprint_id} versions = all
1192025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /deployment/blueprints/all/{blueprint_id} versions = all
1202025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /deployment/blueprints/import versions = all
1212025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /deployment/blueprints/regenerate versions = all
1222025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /deployment/blueprints/target versions = all
1232025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /deployment/blueprints/target versions = all
1242025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = PUT path = /deployment/blueprints/target/enabled versions = all
1252025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /disk/{disk_id}/remove-read-only-parent versions = all
1262025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = PUT path = /disks/{disk_id} versions = all
1272025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /instances/{instance_id}/migrate versions = all
1282025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /metrics/collectors versions = all
1292025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /metrics/collectors/{collector_id}/producers versions = all
1302025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /metrics/producers versions = all
1312025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /nat/ipv4/changeset/{from_gen} versions = all
1322025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /physical-disk/expunge versions = all
1332025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /probes/{sled} versions = all
1342025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = PUT path = /racks/{rack_id}/initialization-complete versions = all
1352025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /sagas versions = all
1362025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /sagas/{saga_id} versions = all
1372025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /sled-agents/{sled_id} versions = all
1382025-03-07T23:29:50.831ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /sled-agents/{sled_id} versions = all
1392025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /sled-agents/{sled_id}/firewall-rules-update versions = all
1402025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /sleds/add versions = all
1412025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /sleds/expunge versions = all
1422025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = GET path = /sleds/uninitialized versions = all
1432025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = PUT path = /switch/{switch_id} versions = all
1442025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = PUT path = /vmms/{propolis_id} versions = all
1452025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:34193 method = POST path = /volume/{volume_id}/remove-read-only-parent versions = all
1462025-03-07T23:29:50.832ZINFOtest_unauthorized (dropshot_internal): listening local_addr = 127.0.0.1:34193
1472025-03-07T23:29:50.832ZDEBGtest_unauthorized (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:34193
1482025-03-07T23:29:50.832ZINFOtest_unauthorized (SEC): SEC running sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
1492025-03-07T23:29:50.833ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1502025-03-07T23:29:50.833ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1512025-03-07T23:29:50.846ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1522025-03-07T23:29:50.846ZDEBGtest_unauthorized (DataLoader): attempting to create built-in users
1532025-03-07T23:29:50.849ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1542025-03-07T23:29:50.849ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1552025-03-07T23:29:50.850ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1562025-03-07T23:29:50.862ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: a5 7a 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .z..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:50019 req_id = 1a33171f-a01e-482f-a8d8-3568dd9f3f67
1572025-03-07T23:29:50.866ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 42362,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50019 req_id = 1a33171f-a01e-482f-a8d8-3568dd9f3f67
1582025-03-07T23:29:50.868ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 42362, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_crucible-pantry._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 16, 95, 99, 114, 117, 99, 105, 98, 108, 101, 45, 112, 97, 110, 116, 114, 121, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:50019 req_id = 1a33171f-a01e-482f-a8d8-3568dd9f3f67
1592025-03-07T23:29:50.895ZINFOtest_unauthorized (DataLoader): created 5 built-in users
1602025-03-07T23:29:50.895ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1612025-03-07T23:29:50.895ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1622025-03-07T23:29:50.898ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1632025-03-07T23:29:50.898ZDEBGtest_unauthorized (DataLoader): attempting to create built-in roles
1642025-03-07T23:29:50.898ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1652025-03-07T23:29:50.898ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1662025-03-07T23:29:50.901ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1672025-03-07T23:29:50.922ZINFOtest_unauthorized (DataLoader): created 10 built-in roles
1682025-03-07T23:29:50.922ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1692025-03-07T23:29:50.922ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1702025-03-07T23:29:50.935ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1712025-03-07T23:29:50.936ZDEBGtest_unauthorized (DataLoader): attempting to create built-in role assignments
1722025-03-07T23:29:50.936ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1732025-03-07T23:29:50.936ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1742025-03-07T23:29:50.936ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1752025-03-07T23:29:51.202ZINFOtest_unauthorized (DataLoader): created 4 built-in role assignments
1762025-03-07T23:29:51.202ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1772025-03-07T23:29:51.202ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1782025-03-07T23:29:51.205ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1792025-03-07T23:29:51.205ZDEBGtest_unauthorized (DataLoader): attempting to create built-in silos
1802025-03-07T23:29:51.205ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1812025-03-07T23:29:51.205ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1822025-03-07T23:29:51.205ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1832025-03-07T23:29:51.290ZINFOtest_unauthorized (DataLoader): created 2 built-in silos
1842025-03-07T23:29:51.290ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1852025-03-07T23:29:51.290ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1862025-03-07T23:29:51.294ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1872025-03-07T23:29:51.310ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1882025-03-07T23:29:51.310ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1892025-03-07T23:29:51.314ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1902025-03-07T23:29:51.314ZDEBGtest_unauthorized (DataLoader): attempting to create built-in projects
1912025-03-07T23:29:51.314ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1922025-03-07T23:29:51.314ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1932025-03-07T23:29:51.314ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1942025-03-07T23:29:51.342ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
1952025-03-07T23:29:51.342ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
1962025-03-07T23:29:51.342ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1972025-03-07T23:29:51.342ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1982025-03-07T23:29:51.343ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1992025-03-07T23:29:51.402ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2002025-03-07T23:29:51.402ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2012025-03-07T23:29:51.402ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2022025-03-07T23:29:51.403ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2032025-03-07T23:29:51.407ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2042025-03-07T23:29:51.411ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2052025-03-07T23:29:51.411ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2062025-03-07T23:29:51.411ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2072025-03-07T23:29:51.411ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2082025-03-07T23:29:51.411ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2092025-03-07T23:29:51.412ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2102025-03-07T23:29:51.420ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2112025-03-07T23:29:51.420ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2122025-03-07T23:29:51.420ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2132025-03-07T23:29:51.420ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2142025-03-07T23:29:51.468ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2152025-03-07T23:29:51.473ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2162025-03-07T23:29:51.473ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2172025-03-07T23:29:51.473ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2182025-03-07T23:29:51.474ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2192025-03-07T23:29:51.491ZINFOtest_unauthorized (DataLoader): created built-in services project
2202025-03-07T23:29:51.491ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2212025-03-07T23:29:51.492ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2222025-03-07T23:29:51.494ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2232025-03-07T23:29:51.494ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPCs
2242025-03-07T23:29:51.494ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2252025-03-07T23:29:51.494ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2262025-03-07T23:29:51.495ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2272025-03-07T23:29:51.497ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2282025-03-07T23:29:51.497ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2292025-03-07T23:29:51.498ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2302025-03-07T23:29:51.500ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2312025-03-07T23:29:51.500ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2322025-03-07T23:29:51.501ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2332025-03-07T23:29:51.501ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2342025-03-07T23:29:51.501ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2352025-03-07T23:29:51.504ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2362025-03-07T23:29:51.504ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2372025-03-07T23:29:51.504ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2382025-03-07T23:29:51.505ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2392025-03-07T23:29:51.507ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2402025-03-07T23:29:51.507ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2412025-03-07T23:29:51.507ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2422025-03-07T23:29:51.508ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2432025-03-07T23:29:51.509ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2442025-03-07T23:29:51.523ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2452025-03-07T23:29:51.523ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Project" using built-in user
2462025-03-07T23:29:51.524ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2472025-03-07T23:29:51.524ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2482025-03-07T23:29:51.524ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2492025-03-07T23:29:51.524ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2502025-03-07T23:29:51.525ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2512025-03-07T23:29:51.533ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2522025-03-07T23:29:51.533ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2532025-03-07T23:29:51.533ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2542025-03-07T23:29:51.535ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2552025-03-07T23:29:51.542ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2562025-03-07T23:29:51.542ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2572025-03-07T23:29:51.542ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2582025-03-07T23:29:51.543ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2592025-03-07T23:29:51.561ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2602025-03-07T23:29:51.627ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2612025-03-07T23:29:51.627ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2622025-03-07T23:29:51.627ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2632025-03-07T23:29:51.627ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2642025-03-07T23:29:51.652ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2652025-03-07T23:29:51.652ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2662025-03-07T23:29:51.652ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2672025-03-07T23:29:51.652ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2682025-03-07T23:29:51.653ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2692025-03-07T23:29:51.655ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2702025-03-07T23:29:51.655ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2712025-03-07T23:29:51.655ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2722025-03-07T23:29:51.656ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2732025-03-07T23:29:51.660ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2742025-03-07T23:29:51.660ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2752025-03-07T23:29:51.660ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2762025-03-07T23:29:51.661ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2772025-03-07T23:29:51.664ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2782025-03-07T23:29:51.675ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2792025-03-07T23:29:51.675ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2802025-03-07T23:29:51.675ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2812025-03-07T23:29:51.676ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2822025-03-07T23:29:51.685ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2832025-03-07T23:29:51.687ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2842025-03-07T23:29:51.690ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2852025-03-07T23:29:51.704ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2862025-03-07T23:29:51.704ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2872025-03-07T23:29:51.705ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2882025-03-07T23:29:51.716ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2892025-03-07T23:29:51.716ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2902025-03-07T23:29:51.717ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2912025-03-07T23:29:51.717ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2922025-03-07T23:29:51.717ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2932025-03-07T23:29:51.720ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2942025-03-07T23:29:51.720ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2952025-03-07T23:29:51.720ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2962025-03-07T23:29:51.720ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2972025-03-07T23:29:51.722ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2982025-03-07T23:29:51.722ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2992025-03-07T23:29:51.723ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3002025-03-07T23:29:51.725ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3012025-03-07T23:29:51.749ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3022025-03-07T23:29:51.758ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3032025-03-07T23:29:51.758ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3042025-03-07T23:29:51.758ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3052025-03-07T23:29:51.759ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3062025-03-07T23:29:51.828ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3072025-03-07T23:29:51.828ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3082025-03-07T23:29:51.828ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3092025-03-07T23:29:51.829ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3102025-03-07T23:29:51.830ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3112025-03-07T23:29:51.832ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3122025-03-07T23:29:51.832ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3132025-03-07T23:29:51.832ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3142025-03-07T23:29:51.833ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3152025-03-07T23:29:51.837ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3162025-03-07T23:29:51.837ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3172025-03-07T23:29:51.837ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3182025-03-07T23:29:51.838ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3192025-03-07T23:29:51.840ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3202025-03-07T23:29:51.849ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3212025-03-07T23:29:51.849ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3222025-03-07T23:29:51.849ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3232025-03-07T23:29:51.850ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3242025-03-07T23:29:51.931ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3252025-03-07T23:29:51.931ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3262025-03-07T23:29:51.931ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3272025-03-07T23:29:51.931ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3282025-03-07T23:29:51.932ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3292025-03-07T23:29:51.936ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3302025-03-07T23:29:51.936ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3312025-03-07T23:29:51.936ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3322025-03-07T23:29:51.937ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3332025-03-07T23:29:51.942ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3342025-03-07T23:29:51.942ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3352025-03-07T23:29:51.942ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3362025-03-07T23:29:51.943ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3372025-03-07T23:29:51.954ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3382025-03-07T23:29:51.966ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3392025-03-07T23:29:51.966ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3402025-03-07T23:29:51.966ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3412025-03-07T23:29:51.967ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3422025-03-07T23:29:51.979ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPC firewall rules
3432025-03-07T23:29:51.979ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3442025-03-07T23:29:51.979ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3452025-03-07T23:29:51.982ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3462025-03-07T23:29:51.986ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3472025-03-07T23:29:51.987ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3482025-03-07T23:29:51.988ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3492025-03-07T23:29:51.992ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3502025-03-07T23:29:51.992ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3512025-03-07T23:29:51.992ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3522025-03-07T23:29:52.019ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3532025-03-07T23:29:52.021ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3542025-03-07T23:29:52.021ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3552025-03-07T23:29:52.021ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3562025-03-07T23:29:52.022ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3572025-03-07T23:29:52.024ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3582025-03-07T23:29:52.024ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3592025-03-07T23:29:52.024ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3602025-03-07T23:29:52.025ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3612025-03-07T23:29:52.052ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3622025-03-07T23:29:52.052ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3632025-03-07T23:29:52.053ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3642025-03-07T23:29:52.054ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3652025-03-07T23:29:52.059ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3662025-03-07T23:29:52.074ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3672025-03-07T23:29:52.075ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
3682025-03-07T23:29:52.075ZTRACtest_unauthorized (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3692025-03-07T23:29:52.075ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3702025-03-07T23:29:52.075ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3712025-03-07T23:29:52.075ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3722025-03-07T23:29:52.076ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3732025-03-07T23:29:52.078ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3742025-03-07T23:29:52.078ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3752025-03-07T23:29:52.078ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3762025-03-07T23:29:52.079ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3772025-03-07T23:29:52.092ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3782025-03-07T23:29:52.092ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3792025-03-07T23:29:52.093ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3802025-03-07T23:29:52.096ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3812025-03-07T23:29:52.100ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3822025-03-07T23:29:52.133ZDEBGtest_unauthorized (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3832025-03-07T23:29:52.133ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3842025-03-07T23:29:52.133ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3852025-03-07T23:29:52.134ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3862025-03-07T23:29:52.156ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3872025-03-07T23:29:52.156ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3882025-03-07T23:29:52.156ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3892025-03-07T23:29:52.157ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3902025-03-07T23:29:52.159ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3912025-03-07T23:29:52.165ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3922025-03-07T23:29:52.165ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3932025-03-07T23:29:52.165ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3942025-03-07T23:29:52.166ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3952025-03-07T23:29:52.185ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3962025-03-07T23:29:52.185ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3972025-03-07T23:29:52.186ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3982025-03-07T23:29:52.188ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3992025-03-07T23:29:52.194ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4002025-03-07T23:29:52.203ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4012025-03-07T23:29:52.203ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4022025-03-07T23:29:52.203ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4032025-03-07T23:29:52.204ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4042025-03-07T23:29:52.307ZINFOtest_unauthorized (DataLoader): created built-in VPC firewall rules
4052025-03-07T23:29:52.307ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPC Subnets
4062025-03-07T23:29:52.307ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4072025-03-07T23:29:52.307ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4082025-03-07T23:29:52.309ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4092025-03-07T23:29:52.314ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4102025-03-07T23:29:52.314ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4112025-03-07T23:29:52.314ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4122025-03-07T23:29:52.317ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4132025-03-07T23:29:52.317ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4142025-03-07T23:29:52.318ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4152025-03-07T23:29:52.370ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4162025-03-07T23:29:52.381ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4172025-03-07T23:29:52.381ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4182025-03-07T23:29:52.381ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4192025-03-07T23:29:52.382ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4202025-03-07T23:29:52.389ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4212025-03-07T23:29:52.391ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4222025-03-07T23:29:52.391ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4232025-03-07T23:29:52.391ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4242025-03-07T23:29:52.396ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4252025-03-07T23:29:52.396ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4262025-03-07T23:29:52.396ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4272025-03-07T23:29:52.397ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4282025-03-07T23:29:52.404ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4292025-03-07T23:29:52.414ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4302025-03-07T23:29:52.414ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4312025-03-07T23:29:52.414ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4322025-03-07T23:29:52.414ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4332025-03-07T23:29:52.415ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4342025-03-07T23:29:52.422ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4352025-03-07T23:29:52.422ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4362025-03-07T23:29:52.422ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4372025-03-07T23:29:52.422ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4382025-03-07T23:29:52.423ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4392025-03-07T23:29:52.425ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4402025-03-07T23:29:52.425ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4412025-03-07T23:29:52.425ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4422025-03-07T23:29:52.426ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4432025-03-07T23:29:52.427ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4442025-03-07T23:29:52.427ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4452025-03-07T23:29:52.427ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4462025-03-07T23:29:52.428ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4472025-03-07T23:29:52.430ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4482025-03-07T23:29:52.442ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4492025-03-07T23:29:52.450ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4502025-03-07T23:29:52.450ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4512025-03-07T23:29:52.450ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4522025-03-07T23:29:52.450ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4532025-03-07T23:29:52.451ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4542025-03-07T23:29:52.453ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4552025-03-07T23:29:52.454ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4562025-03-07T23:29:52.467ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4572025-03-07T23:29:52.468ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4582025-03-07T23:29:52.473ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4592025-03-07T23:29:52.475ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4602025-03-07T23:29:52.476ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4612025-03-07T23:29:52.477ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4622025-03-07T23:29:52.484ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4632025-03-07T23:29:52.496ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4642025-03-07T23:29:52.497ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4652025-03-07T23:29:52.497ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4662025-03-07T23:29:52.498ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4672025-03-07T23:29:52.564ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4682025-03-07T23:29:52.565ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4692025-03-07T23:29:52.565ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4702025-03-07T23:29:52.569ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4712025-03-07T23:29:52.569ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4722025-03-07T23:29:52.570ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4732025-03-07T23:29:52.570ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4742025-03-07T23:29:52.570ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4752025-03-07T23:29:52.572ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4762025-03-07T23:29:52.572ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4772025-03-07T23:29:52.572ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4782025-03-07T23:29:52.573ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4792025-03-07T23:29:52.576ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4802025-03-07T23:29:52.576ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4812025-03-07T23:29:52.576ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4822025-03-07T23:29:52.577ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4832025-03-07T23:29:52.580ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4842025-03-07T23:29:52.593ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4852025-03-07T23:29:52.605ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4862025-03-07T23:29:52.605ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4872025-03-07T23:29:52.605ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4882025-03-07T23:29:52.605ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4892025-03-07T23:29:52.606ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4902025-03-07T23:29:52.621ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4912025-03-07T23:29:52.621ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4922025-03-07T23:29:52.621ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4932025-03-07T23:29:52.621ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4942025-03-07T23:29:52.627ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4952025-03-07T23:29:52.627ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4962025-03-07T23:29:52.627ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4972025-03-07T23:29:52.628ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4982025-03-07T23:29:52.631ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4992025-03-07T23:29:52.648ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5002025-03-07T23:29:52.648ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5012025-03-07T23:29:52.648ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5022025-03-07T23:29:52.648ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5032025-03-07T23:29:52.656ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5042025-03-07T23:29:52.657ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5052025-03-07T23:29:52.658ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5062025-03-07T23:29:52.661ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5072025-03-07T23:29:52.661ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5082025-03-07T23:29:52.661ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5092025-03-07T23:29:52.662ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5102025-03-07T23:29:52.662ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5112025-03-07T23:29:52.664ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5122025-03-07T23:29:52.664ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5132025-03-07T23:29:52.664ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5142025-03-07T23:29:52.665ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5152025-03-07T23:29:52.667ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5162025-03-07T23:29:52.668ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5172025-03-07T23:29:52.668ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5182025-03-07T23:29:52.668ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5192025-03-07T23:29:52.670ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5202025-03-07T23:29:52.682ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5212025-03-07T23:29:52.693ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5222025-03-07T23:29:52.693ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5232025-03-07T23:29:52.693ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5242025-03-07T23:29:52.693ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5252025-03-07T23:29:52.694ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5262025-03-07T23:29:52.696ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5272025-03-07T23:29:52.696ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5282025-03-07T23:29:52.696ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5292025-03-07T23:29:52.697ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5302025-03-07T23:29:52.699ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5312025-03-07T23:29:52.699ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5322025-03-07T23:29:52.699ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5332025-03-07T23:29:52.700ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5342025-03-07T23:29:52.702ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5352025-03-07T23:29:52.714ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5362025-03-07T23:29:52.714ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5372025-03-07T23:29:52.714ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5382025-03-07T23:29:52.715ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5392025-03-07T23:29:52.729ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5402025-03-07T23:29:52.729ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5412025-03-07T23:29:52.730ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5422025-03-07T23:29:52.737ZINFOtest_unauthorized (DataLoader): created built-in services vpc subnets
5432025-03-07T23:29:52.737ZINFOtest_unauthorized (DataLoader): created built-in services vpc
5442025-03-07T23:29:52.737ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5452025-03-07T23:29:52.737ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5462025-03-07T23:29:52.740ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5472025-03-07T23:29:52.740ZDEBGtest_unauthorized (DataLoader): attempting to create silo users
5482025-03-07T23:29:52.740ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5492025-03-07T23:29:52.740ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5502025-03-07T23:29:52.741ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5512025-03-07T23:29:52.750ZINFOtest_unauthorized (DataLoader): created 2 silo users
5522025-03-07T23:29:52.750ZDEBGtest_unauthorized (DataLoader): attempting to create silo user role assignments
5532025-03-07T23:29:52.750ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5542025-03-07T23:29:52.750ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5552025-03-07T23:29:52.751ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5562025-03-07T23:29:52.764ZINFOtest_unauthorized (DataLoader): created 2 silo user role assignments
5572025-03-07T23:29:52.765ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5582025-03-07T23:29:52.765ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5592025-03-07T23:29:52.765ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5602025-03-07T23:29:52.775ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5612025-03-07T23:29:52.775ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5622025-03-07T23:29:52.776ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5632025-03-07T23:29:52.786ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5642025-03-07T23:29:52.786ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5652025-03-07T23:29:52.788ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5662025-03-07T23:29:52.788ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5672025-03-07T23:29:52.789ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5682025-03-07T23:29:52.793ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5692025-03-07T23:29:52.802ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5702025-03-07T23:29:52.802ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5712025-03-07T23:29:52.802ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5722025-03-07T23:29:52.803ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5732025-03-07T23:29:52.813ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5742025-03-07T23:29:52.813ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5752025-03-07T23:29:52.813ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5762025-03-07T23:29:52.813ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5772025-03-07T23:29:52.814ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5782025-03-07T23:29:52.818ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5792025-03-07T23:29:52.822ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5802025-03-07T23:29:52.822ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5812025-03-07T23:29:52.822ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5822025-03-07T23:29:52.823ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5832025-03-07T23:29:52.959ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5842025-03-07T23:29:52.959ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5852025-03-07T23:29:52.960ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5862025-03-07T23:29:52.966ZINFOtest_unauthorized (nexus): populate complete
5872025-03-07T23:29:52.966ZINFOtest_unauthorized (nexus): activating background tasks
5882025-03-07T23:29:52.971ZDEBGtest_unauthorized (init_with_steps): Running step start_sled1
5892025-03-07T23:29:52.974ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5902025-03-07T23:29:53.066ZINFOtest_unauthorized (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5912025-03-07T23:29:53.066ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
5922025-03-07T23:29:53.178ZDEBGtest_unauthorized (dropshot (Repo Depot)): registered endpoint local_addr = [::1]:58969 method = GET path = /artifact/sha256/{sha256} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5932025-03-07T23:29:53.179ZINFOtest_unauthorized (dropshot (Repo Depot)): listening local_addr = [::1]:58969 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5942025-03-07T23:29:53.180ZDEBGtest_unauthorized (dropshot (Repo Depot)): successfully registered DTrace USDT probes local_addr = [::1]:58969 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
5952025-03-07T23:29:53.190ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /artifacts sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5962025-03-07T23:29:53.190ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5972025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5982025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /artifacts/{sha256}/copy-from-depot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
5992025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6002025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6012025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6022025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6032025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /cockroachdb sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6042025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6052025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6062025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6072025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6082025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6092025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6102025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6112025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6122025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6132025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6142025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6152025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6162025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6172025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6182025-03-07T23:29:53.191ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support/dladm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6192025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support/ipadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6202025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support/pargs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6212025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support/pfiles-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6222025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support/pstack-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6232025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support/zoneadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6242025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support-bundles/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6252025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6262025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6272025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6282025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6292025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6302025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6312025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6322025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6332025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6342025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /timesync sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6352025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6362025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6372025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6382025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6392025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6402025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6412025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6422025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6432025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6442025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6452025-03-07T23:29:53.192ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6462025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6472025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6482025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6492025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6502025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6512025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6522025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6532025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6542025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6552025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6562025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6572025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6582025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = POST path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6592025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6602025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6612025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:57532 method = GET path = /zpools sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6622025-03-07T23:29:53.193ZINFOtest_unauthorized (dropshot): listening local_addr = [::1]:57532 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6632025-03-07T23:29:53.193ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:57532 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6642025-03-07T23:29:53.193ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6652025-03-07T23:29:53.193ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6662025-03-07T23:29:53.193ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
6672025-03-07T23:29:53.193ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6682025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6692025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6702025-03-07T23:29:53.195ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6712025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6722025-03-07T23:29:53.195ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
6732025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 61.268\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6742025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
6752025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
6762025-03-07T23:29:53.195ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
6772025-03-07T23:29:53.195ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
6782025-03-07T23:29:53.196ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6792025-03-07T23:29:53.196ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
6802025-03-07T23:29:53.196ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
6812025-03-07T23:29:53.196ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6822025-03-07T23:29:53.196ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6832025-03-07T23:29:53.196ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 23.517\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6842025-03-07T23:29:53.196ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
6852025-03-07T23:29:53.196ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2025-03-07 23:19:53.196763368 UTC
6862025-03-07T23:29:53.197ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
6872025-03-07T23:29:53.197ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
6882025-03-07T23:29:53.197ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
6892025-03-07T23:29:53.197ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
6902025-03-07T23:29:53.197ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
6912025-03-07T23:29:53.197ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6922025-03-07T23:29:53.197ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
6932025-03-07T23:29:53.197ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
6942025-03-07T23:29:53.198ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
6952025-03-07T23:29:53.198ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 1 reason = Timeout
6962025-03-07T23:29:53.198ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
6972025-03-07T23:29:53.198ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
6982025-03-07T23:29:53.199ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
6992025-03-07T23:29:53.199ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
7002025-03-07T23:29:53.199ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
7012025-03-07T23:29:53.199ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
7022025-03-07T23:29:53.200ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
7032025-03-07T23:29:53.200ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
7042025-03-07T23:29:53.200ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
7052025-03-07T23:29:53.200ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig
7062025-03-07T23:29:53.200ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7072025-03-07T23:29:53.200ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
7082025-03-07T23:29:53.200ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7092025-03-07T23:29:53.200ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
7102025-03-07T23:29:53.200ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
7112025-03-07T23:29:53.201ZWARNtest_unauthorized (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
7122025-03-07T23:29:53.201ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 52.515\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7132025-03-07T23:29:53.201ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
7142025-03-07T23:29:53.201ZWARNtest_unauthorized (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
7152025-03-07T23:29:53.201ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 22.496\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7162025-03-07T23:29:53.201ZDEBGtest_unauthorized (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
7172025-03-07T23:29:53.201ZDEBGtest_unauthorized (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:34193/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
7182025-03-07T23:29:53.203ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:61664
7192025-03-07T23:29:53.204ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
7202025-03-07T23:29:53.204ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
7212025-03-07T23:29:53.204ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7222025-03-07T23:29:53.204ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
7232025-03-07T23:29:53.204ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
7242025-03-07T23:29:53.205ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
7252025-03-07T23:29:53.205ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = support_bundle_collector iteration = 1 reason = Timeout
7262025-03-07T23:29:53.205ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet
7272025-03-07T23:29:53.205ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7282025-03-07T23:29:53.205ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
7292025-03-07T23:29:53.205ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
7302025-03-07T23:29:53.206ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
7312025-03-07T23:29:53.206ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
7322025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 21.297\u{b5}s iteration = 1 status = {"error":"task disabled"}
7332025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 1 reason = Timeout
7342025-03-07T23:29:53.207ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
7352025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 110.281\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7362025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7372025-03-07T23:29:53.207ZINFOtest_unauthorized (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7382025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 64.899\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7392025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7402025-03-07T23:29:53.207ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
7412025-03-07T23:29:53.207ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7422025-03-07T23:29:53.207ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
7432025-03-07T23:29:53.207ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
7442025-03-07T23:29:53.208ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
7452025-03-07T23:29:53.208ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7462025-03-07T23:29:53.208ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
7472025-03-07T23:29:53.208ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7482025-03-07T23:29:53.208ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
7492025-03-07T23:29:53.208ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7502025-03-07T23:29:53.209ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7512025-03-07T23:29:53.209ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7522025-03-07T23:29:53.209ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
7532025-03-07T23:29:53.209ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7542025-03-07T23:29:53.210ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
7552025-03-07T23:29:53.210ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7562025-03-07T23:29:53.210ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
7572025-03-07T23:29:53.210ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7582025-03-07T23:29:53.211ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
7592025-03-07T23:29:53.211ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7602025-03-07T23:29:53.211ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
7612025-03-07T23:29:53.211ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7622025-03-07T23:29:53.212ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7632025-03-07T23:29:53.212ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7642025-03-07T23:29:53.212ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
7652025-03-07T23:29:53.212ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7662025-03-07T23:29:53.212ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
7672025-03-07T23:29:53.212ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7682025-03-07T23:29:53.212ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
7692025-03-07T23:29:53.212ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7702025-03-07T23:29:53.212ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7712025-03-07T23:29:53.213ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 461.779\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7722025-03-07T23:29:53.213ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7732025-03-07T23:29:53.213ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
7742025-03-07T23:29:53.213ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7752025-03-07T23:29:53.214ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7762025-03-07T23:29:53.214ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7772025-03-07T23:29:53.214ZDEBGtest_unauthorized (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7782025-03-07T23:29:53.214ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
7792025-03-07T23:29:53.214ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7802025-03-07T23:29:53.215ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7812025-03-07T23:29:53.215ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
7822025-03-07T23:29:53.215ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
7832025-03-07T23:29:53.215ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
7842025-03-07T23:29:53.215ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7852025-03-07T23:29:53.215ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
7862025-03-07T23:29:53.215ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7872025-03-07T23:29:53.215ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7882025-03-07T23:29:53.215ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
7892025-03-07T23:29:53.215ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
7902025-03-07T23:29:53.216ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
7912025-03-07T23:29:53.216ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
7922025-03-07T23:29:53.216ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
7932025-03-07T23:29:53.216ZDEBGtest_unauthorized (SagaRecoverer): listing candidate sagas for recovery
7942025-03-07T23:29:53.216ZTRACtest_unauthorized (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database
7952025-03-07T23:29:53.216ZDEBGtest_unauthorized (SagaRecoverer): roles roles = RoleSet { roles: {} }
7962025-03-07T23:29:53.217ZDEBGtest_unauthorized (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database result = Ok(())
7972025-03-07T23:29:53.217ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
7982025-03-07T23:29:53.217ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
7992025-03-07T23:29:53.217ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
8002025-03-07T23:29:53.217ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
8012025-03-07T23:29:53.217ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
8022025-03-07T23:29:53.217ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
8032025-03-07T23:29:53.218ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
8042025-03-07T23:29:53.218ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
8052025-03-07T23:29:53.218ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
8062025-03-07T23:29:53.218ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
8072025-03-07T23:29:53.218ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
8082025-03-07T23:29:53.219ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
8092025-03-07T23:29:53.219ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
8102025-03-07T23:29:53.219ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
8112025-03-07T23:29:53.219ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
8122025-03-07T23:29:53.220ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
8132025-03-07T23:29:53.220ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
8142025-03-07T23:29:53.220ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database
8152025-03-07T23:29:53.220ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
8162025-03-07T23:29:53.220ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
8172025-03-07T23:29:53.220ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = tuf_artifact_replication iteration = 1 reason = Timeout
8182025-03-07T23:29:53.220ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
8192025-03-07T23:29:53.220ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8202025-03-07T23:29:53.220ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
8212025-03-07T23:29:53.221ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
8222025-03-07T23:29:53.221ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
8232025-03-07T23:29:53.221ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 1 reason = Timeout
8242025-03-07T23:29:53.221ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database
8252025-03-07T23:29:53.221ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
8262025-03-07T23:29:53.222ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
8272025-03-07T23:29:53.222ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
8282025-03-07T23:29:53.222ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8292025-03-07T23:29:53.222ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
8302025-03-07T23:29:53.223ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
8312025-03-07T23:29:53.223ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
8322025-03-07T23:29:53.225ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:61664 req_id = 01c60d20-f905-4229-b23b-c70d49e80f34 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
8332025-03-07T23:29:53.225ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: d6 24 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .$..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:65214 req_id = 75b9a67d-7475-4849-aa2c-63599c229fdb
8342025-03-07T23:29:53.225ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54820,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65214 req_id = 75b9a67d-7475-4849-aa2c-63599c229fdb
8352025-03-07T23:29:53.225ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 54820, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:65214 req_id = 75b9a67d-7475-4849-aa2c-63599c229fdb
8362025-03-07T23:29:53.226ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 78 b3 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 x............_ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:56308 req_id = d3a7b622-d323-4dcc-b7f8-2091b0aa7ca3
8372025-03-07T23:29:53.226ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30899,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56308 req_id = d3a7b622-d323-4dcc-b7f8-2091b0aa7ca3
8382025-03-07T23:29:53.226ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 30899, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56308 req_id = d3a7b622-d323-4dcc-b7f8-2091b0aa7ca3
8392025-03-07T23:29:53.229ZINFOtest_unauthorized (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
8402025-03-07T23:29:53.229ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8412025-03-07T23:29:53.229ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8422025-03-07T23:29:53.229ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
8432025-03-07T23:29:53.230ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8442025-03-07T23:29:53.231ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8452025-03-07T23:29:53.232ZWARNtest_unauthorized (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8462025-03-07T23:29:53.232ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 37.381682ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8472025-03-07T23:29:53.232ZWARNtest_unauthorized (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8482025-03-07T23:29:53.232ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 36.173102ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8492025-03-07T23:29:53.239ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2025-03-07 23:19:53.196763368 UTC pruned = {}
8502025-03-07T23:29:53.239ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 42.479664ms iteration = 1 status = {"expiration":"2025-03-07T23:19:53.196763368Z","pruned":[]}
8512025-03-07T23:29:53.244ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8522025-03-07T23:29:53.245ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: cb c5 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:51147 req_id = 0e5f8de1-7ae3-4118-909c-d14ca981220c
8532025-03-07T23:29:53.245ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 52165,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51147 req_id = 0e5f8de1-7ae3-4118-909c-d14ca981220c
8542025-03-07T23:29:53.247ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 52165, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:51147 req_id = 0e5f8de1-7ae3-4118-909c-d14ca981220c
8552025-03-07T23:29:53.247ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8562025-03-07T23:29:53.275ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 75.205098ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
8572025-03-07T23:29:53.276ZERROtest_unauthorized (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_v4_garbage_collector error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8582025-03-07T23:29:53.276ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = nat_v4_garbage_collector elapsed = 78.272619ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8592025-03-07T23:29:53.278ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 0f e9 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:62052 req_id = 4a820c5f-2e2e-433f-ad18-9741d8617957
8602025-03-07T23:29:53.279ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 4073,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62052 req_id = 4a820c5f-2e2e-433f-ad18-9741d8617957
8612025-03-07T23:29:53.279ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 4073, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:62052 req_id = 4a820c5f-2e2e-433f-ad18-9741d8617957
8622025-03-07T23:29:53.280ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8632025-03-07T23:29:53.289ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
8642025-03-07T23:29:53.289ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
8652025-03-07T23:29:53.289ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
8662025-03-07T23:29:53.292ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
8672025-03-07T23:29:53.292ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8682025-03-07T23:29:53.298ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
8692025-03-07T23:29:53.298ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8702025-03-07T23:29:53.299ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8712025-03-07T23:29:53.299ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8722025-03-07T23:29:53.305ZERROtest_unauthorized (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8732025-03-07T23:29:53.305ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 106.284699ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8742025-03-07T23:29:53.306ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8752025-03-07T23:29:53.317ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
8762025-03-07T23:29:53.317ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
8772025-03-07T23:29:53.317ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
8782025-03-07T23:29:53.319ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
8792025-03-07T23:29:53.352ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8802025-03-07T23:29:53.357ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
8812025-03-07T23:29:53.357ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
8822025-03-07T23:29:53.358ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
8832025-03-07T23:29:53.359ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
8842025-03-07T23:29:53.359ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8852025-03-07T23:29:53.371ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
8862025-03-07T23:29:53.371ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
8872025-03-07T23:29:53.372ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
8882025-03-07T23:29:53.372ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
8892025-03-07T23:29:53.384ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8902025-03-07T23:29:53.390ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
8912025-03-07T23:29:53.390ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
8922025-03-07T23:29:53.390ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
8932025-03-07T23:29:53.391ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
8942025-03-07T23:29:53.410ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8952025-03-07T23:29:53.416ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
8962025-03-07T23:29:53.416ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
8972025-03-07T23:29:53.416ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
8982025-03-07T23:29:53.418ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
8992025-03-07T23:29:53.436ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9002025-03-07T23:29:53.436ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9012025-03-07T23:29:53.438ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9022025-03-07T23:29:53.438ZTRACtest_unauthorized (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
9032025-03-07T23:29:53.438ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
9042025-03-07T23:29:53.438ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
9052025-03-07T23:29:53.439ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
9062025-03-07T23:29:53.439ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9072025-03-07T23:29:53.444ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9082025-03-07T23:29:53.444ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
9092025-03-07T23:29:53.444ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9102025-03-07T23:29:53.444ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
9112025-03-07T23:29:53.444ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9122025-03-07T23:29:53.445ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9132025-03-07T23:29:53.452ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
9142025-03-07T23:29:53.452ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
9152025-03-07T23:29:53.453ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
9162025-03-07T23:29:53.474ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 257.486276ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
9172025-03-07T23:29:53.474ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
9182025-03-07T23:29:53.474ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
9192025-03-07T23:29:53.475ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
9202025-03-07T23:29:53.543ZDEBGtest_unauthorized (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
9212025-03-07T23:29:53.543ZINFOtest_unauthorized (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
9222025-03-07T23:29:53.543ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 327.730321ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
9232025-03-07T23:29:53.613ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
9242025-03-07T23:29:53.613ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
9252025-03-07T23:29:53.614ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
9262025-03-07T23:29:53.614ZINFOtest_unauthorized (SagaRecoverer): listed in-progress sagas count = 0
9272025-03-07T23:29:53.614ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 397.905975ms iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
9282025-03-07T23:29:53.630ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9292025-03-07T23:29:53.637ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
9302025-03-07T23:29:53.637ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
9312025-03-07T23:29:53.637ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9322025-03-07T23:29:53.637ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
9332025-03-07T23:29:53.637ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
9342025-03-07T23:29:53.638ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
9352025-03-07T23:29:53.644ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 426.423496ms iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
9362025-03-07T23:29:53.646ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
9372025-03-07T23:29:53.646ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
9382025-03-07T23:29:53.647ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
9392025-03-07T23:29:53.674ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
9402025-03-07T23:29:53.674ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
9412025-03-07T23:29:53.675ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
9422025-03-07T23:29:53.708ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 488.823887ms iteration = 1 status = {"errors":[],"finish_invoked_ok":[]}
9432025-03-07T23:29:53.718ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 497.205041ms iteration = 1 status = {"errors":[],"requests_created_ok":[]}
9442025-03-07T23:29:53.723ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9452025-03-07T23:29:53.732ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
9462025-03-07T23:29:53.748ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9472025-03-07T23:29:53.757ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
9482025-03-07T23:29:53.782ZWARNtest_unauthorized (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
9492025-03-07T23:29:53.782ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 574.994885ms iteration = 1 status = {"error":"inventory collection is None"}
9502025-03-07T23:29:53.810ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
9512025-03-07T23:29:53.810ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9522025-03-07T23:29:53.811ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
9532025-03-07T23:29:53.811ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9542025-03-07T23:29:53.812ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
9552025-03-07T23:29:53.853ZWARNtest_unauthorized (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
9562025-03-07T23:29:53.853ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 652.957737ms iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
9572025-03-07T23:29:53.866ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 658.208362ms iteration = 1 status = {}
9582025-03-07T23:29:53.867ZWARNtest_unauthorized (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
9592025-03-07T23:29:53.867ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 672.054561ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
9602025-03-07T23:29:53.884ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9612025-03-07T23:29:53.884ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9622025-03-07T23:29:53.885ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9632025-03-07T23:29:53.886ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
9642025-03-07T23:29:53.886ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 674.474201ms iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
9652025-03-07T23:29:53.899ZTRACtest_unauthorized (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
9662025-03-07T23:29:53.899ZWARNtest_unauthorized (BackgroundTasks): instance reincarnation completed with errors background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0 query_errors = 0 restart_errors = 0
9672025-03-07T23:29:53.900ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 687.689974ms iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
9682025-03-07T23:29:53.901ZWARNtest_unauthorized (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
9692025-03-07T23:29:53.901ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 707.489917ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
9702025-03-07T23:29:53.936ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
9712025-03-07T23:29:53.936ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
9722025-03-07T23:29:53.952ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 727922 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:61664 req_id = 01c60d20-f905-4229-b23b-c70d49e80f34 response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
9732025-03-07T23:29:53.954ZDEBGtest_unauthorized (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:34193/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "01c60d20-f905-4229-b23b-c70d49e80f34", "date": "Fri, 07 Mar 2025 23:29:53 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9742025-03-07T23:29:53.954ZDEBGtest_unauthorized (init_with_steps): Running step start_crucible_pantry
9752025-03-07T23:29:53.955ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9762025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9772025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9782025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9792025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9802025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9812025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9822025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9832025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9842025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9852025-03-07T23:29:53.956ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:37181 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9862025-03-07T23:29:53.956ZINFOtest_unauthorized (dropshot): listening kind = pantry local_addr = [::1]:37181 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9872025-03-07T23:29:53.957ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:37181 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9882025-03-07T23:29:53.957ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:37181 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9892025-03-07T23:29:53.957ZDEBGtest_unauthorized (init_with_steps): Running step populate_internal_dns
9902025-03-07T23:29:53.957ZDEBGtest_unauthorized: Populating Internal DNS
9912025-03-07T23:29:54.118ZINFOtest_unauthorized: DNS population: DnsConfigParams { generation: Generation( 1, ), time_created: 2025-03-07T23:29:54.118050538Z, zones: [ DnsConfigZone { zone_name: "control-plane.oxide.internal", records: { "_clickhouse-admin-single-server._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 8888, target: "b41b6f64-4855-45a3-ae86-1c47fc60f2f5.host.control-plane.oxide.internal", }, ), ], "_clickhouse-native._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "b41b6f64-4855-45a3-ae86-1c47fc60f2f5.host.control-plane.oxide.internal", }, ), ], "_nameservice._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 48967, target: "c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal", }, ), ], "_crucible-pantry._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 37181, target: "970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal", }, ), ], "ad8ce038-e1a8-4f86-9f0d-ea553fdc1fa6.host": [ Aaaa( ::1, ), ], "b41b6f64-4855-45a3-ae86-1c47fc60f2f5.host": [ Aaaa( ::1, ), ], "_nexus._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 34193, target: "2d8d1c15-8782-4d4a-a8ba-3818fa1c29af.host.control-plane.oxide.internal", }, ), ], "c01c014b-4287-4af4-b66b-41095bf7841f.host": [ Aaaa( ::1, ), ], "_mgs._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 39609, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "2d8d1c15-8782-4d4a-a8ba-3818fa1c29af.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "_mgd._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 49873, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_clickhouse._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 62398, target: "b41b6f64-4855-45a3-ae86-1c47fc60f2f5.host.control-plane.oxide.internal", }, ), ], "2020e185-cc36-4881-9ae7-262f444268e3.host": [ Aaaa( ::1, ), ], "970fdb91-c50e-4377-8574-36fae7b3e4e7.host": [ Aaaa( ::1, ), ], "_cockroach._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 51792, target: "ad8ce038-e1a8-4f86-9f0d-ea553fdc1fa6.host.control-plane.oxide.internal", }, ), ], "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], "_external-dns._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 39729, target: "2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal", }, ), ], "_dendrite._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 35050, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], }, }, ], }
9922025-03-07T23:29:54.118ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:48967/config
9932025-03-07T23:29:54.119ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 57 92 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 W............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:61363 req_id = b7cfd6b7-b7dd-4629-9c2e-1464c66c0c0d
9942025-03-07T23:29:54.119ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 22418,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61363 req_id = b7cfd6b7-b7dd-4629-9c2e-1464c66c0c0d
9952025-03-07T23:29:54.119ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 22418, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:61363 req_id = b7cfd6b7-b7dd-4629-9c2e-1464c66c0c0d
9962025-03-07T23:29:54.120ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9972025-03-07T23:29:54.126ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9982025-03-07T23:29:54.126ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
9992025-03-07T23:29:54.126ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
10002025-03-07T23:29:54.127ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
10012025-03-07T23:29:54.127ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet
10022025-03-07T23:29:54.127ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10032025-03-07T23:29:54.127ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
10042025-03-07T23:29:54.127ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
10052025-03-07T23:29:54.127ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
10062025-03-07T23:29:54.128ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 917.042277ms iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
10072025-03-07T23:29:54.128ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:48967 remote_addr = [::1]:63960
10082025-03-07T23:29:54.129ZWARNtest_unauthorized (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
10092025-03-07T23:29:54.129ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 924.938895ms iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
10102025-03-07T23:29:54.129ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
10112025-03-07T23:29:54.129ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
10122025-03-07T23:29:54.129ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10132025-03-07T23:29:54.129ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
10142025-03-07T23:29:54.129ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10152025-03-07T23:29:54.130ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
10162025-03-07T23:29:54.133ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:48967 method = PUT remote_addr = [::1]:63960 req_id = 4af565d4-f050-4dd7-90fc-bf6185e95b29 uri = /config
10172025-03-07T23:29:54.134ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = 4af565d4-f050-4dd7-90fc-bf6185e95b29
10182025-03-07T23:29:54.134ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
10192025-03-07T23:29:54.134ZDEBGtest_unauthorized (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
10202025-03-07T23:29:54.135ZDEBGtest_unauthorized (store): updating current config
10212025-03-07T23:29:54.135ZDEBGtest_unauthorized (store): flushing default tree
10222025-03-07T23:29:54.135ZINFOtest_unauthorized (store): pruning trees for generations older than 1 keep = 3
10232025-03-07T23:29:54.135ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = 4af565d4-f050-4dd7-90fc-bf6185e95b29
10242025-03-07T23:29:54.135ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 2242 local_addr = [::1]:48967 method = PUT remote_addr = [::1]:63960 req_id = 4af565d4-f050-4dd7-90fc-bf6185e95b29 response_code = 204 uri = /config
10252025-03-07T23:29:54.136ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:48967/config", status: 204, headers: {"x-request-id": "4af565d4-f050-4dd7-90fc-bf6185e95b29", "date": "Fri, 07 Mar 2025 23:29:53 GMT"} })
10262025-03-07T23:29:54.137ZDEBGtest_unauthorized (init_with_steps): Running step configure_sled_agents
10272025-03-07T23:29:54.251ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:57532/omicron-zones
10282025-03-07T23:29:54.252ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement elapsed = 1.042216303s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
10292025-03-07T23:29:54.253ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10302025-03-07T23:29:54.258ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
10312025-03-07T23:29:54.258ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
10322025-03-07T23:29:54.258ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
10332025-03-07T23:29:54.259ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
10342025-03-07T23:29:54.260ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:52469 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10352025-03-07T23:29:54.260ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52469 req_id = 174799b8-e0ed-4b10-8b73-5aea387616c1 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
10362025-03-07T23:29:54.265ZINFOtest_unauthorized (dropshot): request completed latency_us = 5346 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52469 req_id = 174799b8-e0ed-4b10-8b73-5aea387616c1 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
10372025-03-07T23:29:54.266ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 1.048699524s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
10382025-03-07T23:29:54.267ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:57532/omicron-zones", status: 204, headers: {"x-request-id": "174799b8-e0ed-4b10-8b73-5aea387616c1", "date": "Fri, 07 Mar 2025 23:29:54 GMT"} })
10392025-03-07T23:29:54.267ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:57532/network-bootstore-config
10402025-03-07T23:29:54.268ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10412025-03-07T23:29:54.282ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
10422025-03-07T23:29:54.283ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
10432025-03-07T23:29:54.283ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
10442025-03-07T23:29:54.284ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
10452025-03-07T23:29:54.284ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52469 req_id = b007dcf6-2419-404b-a6fc-13340b171fc9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
10462025-03-07T23:29:54.285ZINFOtest_unauthorized (dropshot): request completed latency_us = 800 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52469 req_id = b007dcf6-2419-404b-a6fc-13340b171fc9 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
10472025-03-07T23:29:54.286ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:57532/network-bootstore-config", status: 204, headers: {"x-request-id": "b007dcf6-2419-404b-a6fc-13340b171fc9", "date": "Fri, 07 Mar 2025 23:29:54 GMT"} })
10482025-03-07T23:29:54.288ZDEBGtest_unauthorized (init_with_steps): Running step start_nexus_external
10492025-03-07T23:29:54.288ZDEBGtest_unauthorized: Starting Nexus (external API)
10502025-03-07T23:29:55.833ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
10512025-03-07T23:29:55.833ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10522025-03-07T23:29:55.833ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
10532025-03-07T23:29:55.833ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
10542025-03-07T23:29:55.834ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
10552025-03-07T23:29:55.834ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
10562025-03-07T23:29:55.834ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
10572025-03-07T23:29:55.834ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10582025-03-07T23:29:55.834ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10592025-03-07T23:29:55.835ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10602025-03-07T23:29:55.836ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
10612025-03-07T23:29:55.836ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
10622025-03-07T23:29:55.837ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
10632025-03-07T23:29:55.840ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
10642025-03-07T23:29:55.840ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10652025-03-07T23:29:55.840ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
10662025-03-07T23:29:55.840ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10672025-03-07T23:29:55.840ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
10682025-03-07T23:29:55.929ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
10692025-03-07T23:29:55.929ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
10702025-03-07T23:29:55.930ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10712025-03-07T23:29:55.935ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
10722025-03-07T23:29:55.935ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
10732025-03-07T23:29:55.935ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
10742025-03-07T23:29:55.935ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
10752025-03-07T23:29:55.936ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10762025-03-07T23:29:55.942ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
10772025-03-07T23:29:55.942ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
10782025-03-07T23:29:55.942ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10792025-03-07T23:29:55.942ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
10802025-03-07T23:29:55.943ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:52237 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10812025-03-07T23:29:55.945ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:52237 req_id = cf0647c7-54d4-44fe-85c3-bd37b63a8dc9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
10822025-03-07T23:29:55.945ZINFOtest_unauthorized (dropshot): request completed latency_us = 303 local_addr = [::1]:57532 method = GET remote_addr = [::1]:52237 req_id = cf0647c7-54d4-44fe-85c3-bd37b63a8dc9 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
10832025-03-07T23:29:55.948ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "cf0647c7-54d4-44fe-85c3-bd37b63a8dc9", "content-length": "2", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
10842025-03-07T23:29:55.948ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
10852025-03-07T23:29:55.948ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
10862025-03-07T23:29:55.948ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
10872025-03-07T23:29:55.952ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
10882025-03-07T23:29:55.952ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10892025-03-07T23:29:55.952ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10902025-03-07T23:29:55.956ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10912025-03-07T23:29:55.956ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10922025-03-07T23:29:55.958ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
10932025-03-07T23:29:55.958ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
10942025-03-07T23:29:55.958ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
10952025-03-07T23:29:55.959ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
10962025-03-07T23:29:55.980ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10972025-03-07T23:29:55.998ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
10982025-03-07T23:29:55.998ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
10992025-03-07T23:29:55.998ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11002025-03-07T23:29:55.998ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11012025-03-07T23:29:55.998ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11022025-03-07T23:29:55.998ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11032025-03-07T23:29:56.008ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
11042025-03-07T23:29:56.008ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11052025-03-07T23:29:56.018ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11062025-03-07T23:29:56.018ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11072025-03-07T23:29:56.018ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11082025-03-07T23:29:56.019ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11092025-03-07T23:29:56.024ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: b0 66 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .f..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:61024 req_id = efd146c4-b3a2-46ea-9c91-c77e48c4f056
11102025-03-07T23:29:56.025ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 45158,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61024 req_id = efd146c4-b3a2-46ea-9c91-c77e48c4f056
11112025-03-07T23:29:56.025ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
11122025-03-07T23:29:56.025ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
11132025-03-07T23:29:56.025ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:61024 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = efd146c4-b3a2-46ea-9c91-c77e48c4f056
11142025-03-07T23:29:56.037ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11152025-03-07T23:29:56.041ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
11162025-03-07T23:29:56.041ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11172025-03-07T23:29:56.041ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11182025-03-07T23:29:56.041ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11192025-03-07T23:29:56.042ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
11202025-03-07T23:29:56.042ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
11212025-03-07T23:29:56.042ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
11222025-03-07T23:29:56.043ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3892, tv_nsec: 590302047 } })
11232025-03-07T23:29:56.043ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
11242025-03-07T23:29:56.048ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 19 d6 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:62734 req_id = 13f3bbcd-d9a8-4899-ab8f-2284091a787e
11252025-03-07T23:29:56.048ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 6614,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62734 req_id = 13f3bbcd-d9a8-4899-ab8f-2284091a787e
11262025-03-07T23:29:56.049ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
11272025-03-07T23:29:56.049ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62734 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 13f3bbcd-d9a8-4899-ab8f-2284091a787e
11282025-03-07T23:29:56.234ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
11292025-03-07T23:29:56.240ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11302025-03-07T23:29:56.255ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
11312025-03-07T23:29:56.255ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
11322025-03-07T23:29:56.255ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
11332025-03-07T23:29:56.255ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
11342025-03-07T23:29:56.255ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11352025-03-07T23:29:56.255ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11362025-03-07T23:29:56.255ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11372025-03-07T23:29:56.256ZWARNtest_unauthorized (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
11382025-03-07T23:29:56.256ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 3.058634311s iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
11392025-03-07T23:29:56.256ZINFOtest_unauthorized (BackgroundTasks): No bundles to collect background_task = support_bundle_collector
11402025-03-07T23:29:56.256ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = support_bundle_collector elapsed = 3.050897607s iteration = 1 status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
11412025-03-07T23:29:56.370ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
11422025-03-07T23:29:56.370ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11432025-03-07T23:29:56.370ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
11442025-03-07T23:29:56.383ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11452025-03-07T23:29:56.384ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11462025-03-07T23:29:56.385ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 3.165639442s iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
11472025-03-07T23:29:56.385ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
11482025-03-07T23:29:56.385ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
11492025-03-07T23:29:56.483ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:57532/v2p
11502025-03-07T23:29:56.486ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
11512025-03-07T23:29:56.486ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11522025-03-07T23:29:56.486ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11532025-03-07T23:29:56.488ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11542025-03-07T23:29:56.488ZINFOtest_unauthorized (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
11552025-03-07T23:29:56.488ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
11562025-03-07T23:29:56.489ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
11572025-03-07T23:29:56.489ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
11582025-03-07T23:29:56.491ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:40022 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11592025-03-07T23:29:56.491ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52237 req_id = 3b45b536-ab0e-422d-affb-bf0c689e2a03 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
11602025-03-07T23:29:56.492ZINFOtest_unauthorized (dropshot): request completed latency_us = 783 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52237 req_id = 3b45b536-ab0e-422d-affb-bf0c689e2a03 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
11612025-03-07T23:29:56.492ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11622025-03-07T23:29:56.501ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
11632025-03-07T23:29:56.502ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
11642025-03-07T23:29:56.502ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11652025-03-07T23:29:56.502ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11662025-03-07T23:29:56.515ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11672025-03-07T23:29:56.515ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11682025-03-07T23:29:56.515ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11692025-03-07T23:29:56.517ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11702025-03-07T23:29:56.522ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11712025-03-07T23:29:56.548ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
11722025-03-07T23:29:56.548ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11732025-03-07T23:29:56.548ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11742025-03-07T23:29:56.549ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11752025-03-07T23:29:56.550ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication body = None method = GET uri = http://[::1]:57532/artifacts
11762025-03-07T23:29:56.553ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:34441 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11772025-03-07T23:29:56.553ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:40022 req_id = 8727bb0e-4fd0-4ce1-a722-48a7ffc9f0cf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
11782025-03-07T23:29:56.556ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 98 63 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c .c..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:50833 req_id = 1d1c953a-9cd6-4f9d-9b15-4a291a0c4657
11792025-03-07T23:29:56.556ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 39011,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50833 req_id = 1d1c953a-9cd6-4f9d-9b15-4a291a0c4657
11802025-03-07T23:29:56.557ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
11812025-03-07T23:29:56.557ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 39011, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:50833 req_id = 1d1c953a-9cd6-4f9d-9b15-4a291a0c4657
11822025-03-07T23:29:56.557ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "3b45b536-ab0e-422d-affb-bf0c689e2a03", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
11832025-03-07T23:29:56.558ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 3.34339421s iteration = 1 status = {}
11842025-03-07T23:29:56.559ZINFOtest_unauthorized (dropshot): request completed latency_us = 6203 local_addr = [::1]:57532 method = GET remote_addr = [::1]:40022 req_id = 8727bb0e-4fd0-4ce1-a722-48a7ffc9f0cf response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
11852025-03-07T23:29:56.559ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11862025-03-07T23:29:56.559ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11872025-03-07T23:29:56.560ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11882025-03-07T23:29:56.561ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
11892025-03-07T23:29:56.561ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11902025-03-07T23:29:56.561ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
11912025-03-07T23:29:56.561ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
11922025-03-07T23:29:56.561ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
11932025-03-07T23:29:56.563ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
11942025-03-07T23:29:56.563ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
11952025-03-07T23:29:56.563ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
11962025-03-07T23:29:56.563ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:34441 req_id = a95bb222-5218-4227-be11-f5797e36e213 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
11972025-03-07T23:29:56.563ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:57532/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "8727bb0e-4fd0-4ce1-a722-48a7ffc9f0cf", "content-length": "2", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
11982025-03-07T23:29:56.563ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
11992025-03-07T23:29:56.563ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
12002025-03-07T23:29:56.563ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
12012025-03-07T23:29:56.567ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 3.357762545s iteration = 1 status = {}
12022025-03-07T23:29:56.571ZINFOtest_unauthorized (dropshot): request completed latency_us = 8150 local_addr = [::1]:57532 method = GET remote_addr = [::1]:34441 req_id = a95bb222-5218-4227-be11-f5797e36e213 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
12032025-03-07T23:29:56.571ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12042025-03-07T23:29:56.572ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12052025-03-07T23:29:56.573ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12062025-03-07T23:29:56.576ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication result = Ok(Response { url: "http://[::1]:57532/artifacts", status: 200, headers: {"content-type": "application/json", "x-request-id": "a95bb222-5218-4227-be11-f5797e36e213", "content-length": "2", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
12072025-03-07T23:29:56.576ZINFOtest_unauthorized (BackgroundTasks): Successfully got artifact list background_task = tuf_artifact_replication sled = http://[::1]:57532
12082025-03-07T23:29:56.579ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = tuf_artifact_replication elapsed = 3.358793505s iteration = 1 status = {"last_run_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[{"operation":"list","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2025-03-07T23:29:56.576854727Z"}]}
12092025-03-07T23:29:56.580ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12102025-03-07T23:29:56.587ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
12112025-03-07T23:29:56.588ZDEBGtest_unauthorized (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
12122025-03-07T23:29:56.588ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12132025-03-07T23:29:56.588ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12142025-03-07T23:29:56.588ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12152025-03-07T23:29:56.589ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12162025-03-07T23:29:56.590ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12172025-03-07T23:29:56.591ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12182025-03-07T23:29:56.612ZINFOtest_unauthorized (InternalApi): Using static configuration for external switchports
12192025-03-07T23:29:56.612ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12202025-03-07T23:29:56.612ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12212025-03-07T23:29:56.613ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12222025-03-07T23:29:56.615ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
12232025-03-07T23:29:56.615ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12242025-03-07T23:29:56.615ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12252025-03-07T23:29:56.615ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12262025-03-07T23:29:56.616ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12272025-03-07T23:29:56.621ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "d15648fb-a1f3-4845-a588-652b08cf7bfe", "content-length": "835", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
12282025-03-07T23:29:56.623ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
12292025-03-07T23:29:56.636ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12302025-03-07T23:29:56.636ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12312025-03-07T23:29:56.636ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12322025-03-07T23:29:56.636ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12332025-03-07T23:29:56.647ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8c1a3c8-038b-4e4e-8d69-36c09b7d4006", "content-length": "734", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
12342025-03-07T23:29:56.647ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
12352025-03-07T23:29:56.648ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12362025-03-07T23:29:56.648ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12372025-03-07T23:29:56.648ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12382025-03-07T23:29:56.649ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12392025-03-07T23:29:56.658ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12402025-03-07T23:29:56.669ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
12412025-03-07T23:29:56.669ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
12422025-03-07T23:29:56.670ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12432025-03-07T23:29:56.670ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12442025-03-07T23:29:56.670ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12452025-03-07T23:29:56.671ZINFOtest_unauthorized (InternalApi): Recording Rack Network Configuration
12462025-03-07T23:29:56.671ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12472025-03-07T23:29:56.671ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
12482025-03-07T23:29:56.672ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12492025-03-07T23:29:56.679ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12502025-03-07T23:29:56.679ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12512025-03-07T23:29:56.680ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12522025-03-07T23:29:56.694ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12532025-03-07T23:29:56.695ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12542025-03-07T23:29:56.696ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12552025-03-07T23:29:56.706ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12562025-03-07T23:29:56.707ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12572025-03-07T23:29:56.707ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12582025-03-07T23:29:56.714ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
12592025-03-07T23:29:56.714ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12602025-03-07T23:29:56.714ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12612025-03-07T23:29:56.714ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12622025-03-07T23:29:56.715ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12632025-03-07T23:29:56.724ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12642025-03-07T23:29:56.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12652025-03-07T23:29:56.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12662025-03-07T23:29:56.726ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12672025-03-07T23:29:56.733ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "64e6b0ac-5e59-4f98-840d-8ebe823db41b", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
12682025-03-07T23:29:56.733ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
12692025-03-07T23:29:56.734ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12702025-03-07T23:29:56.734ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12712025-03-07T23:29:56.734ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12722025-03-07T23:29:56.734ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12732025-03-07T23:29:56.752ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12742025-03-07T23:29:56.761ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
12752025-03-07T23:29:56.761ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
12762025-03-07T23:29:56.761ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
12772025-03-07T23:29:56.761ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12782025-03-07T23:29:56.761ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12792025-03-07T23:29:56.761ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12802025-03-07T23:29:56.762ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12812025-03-07T23:29:56.766ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12822025-03-07T23:29:56.766ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12832025-03-07T23:29:56.766ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12842025-03-07T23:29:56.767ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12852025-03-07T23:29:56.770ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12862025-03-07T23:29:56.773ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12872025-03-07T23:29:56.774ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12882025-03-07T23:29:56.774ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12892025-03-07T23:29:56.776ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12902025-03-07T23:29:56.797ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
12912025-03-07T23:29:56.797ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12922025-03-07T23:29:56.797ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12932025-03-07T23:29:56.798ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12942025-03-07T23:29:56.809ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12952025-03-07T23:29:56.810ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12962025-03-07T23:29:56.810ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12972025-03-07T23:29:56.813ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12982025-03-07T23:29:56.813ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12992025-03-07T23:29:56.814ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13002025-03-07T23:29:56.823ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13012025-03-07T23:29:56.824ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13022025-03-07T23:29:56.825ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13032025-03-07T23:29:56.826ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
13042025-03-07T23:29:56.826ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13052025-03-07T23:29:56.826ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13062025-03-07T23:29:56.826ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13072025-03-07T23:29:56.827ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13082025-03-07T23:29:56.831ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13092025-03-07T23:29:56.831ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13102025-03-07T23:29:56.832ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13112025-03-07T23:29:56.839ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
13122025-03-07T23:29:56.839ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13132025-03-07T23:29:56.839ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13142025-03-07T23:29:56.839ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13152025-03-07T23:29:56.840ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13162025-03-07T23:29:56.844ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13172025-03-07T23:29:56.844ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13182025-03-07T23:29:56.844ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13192025-03-07T23:29:56.845ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13202025-03-07T23:29:56.845ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13212025-03-07T23:29:56.849ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
13222025-03-07T23:29:56.849ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13232025-03-07T23:29:56.849ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13242025-03-07T23:29:56.850ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13252025-03-07T23:29:56.851ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13262025-03-07T23:29:56.851ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13272025-03-07T23:29:56.851ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13282025-03-07T23:29:56.852ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13292025-03-07T23:29:56.866ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") }
13302025-03-07T23:29:56.866ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13312025-03-07T23:29:56.866ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13322025-03-07T23:29:56.866ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13332025-03-07T23:29:56.867ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13342025-03-07T23:29:56.868ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13352025-03-07T23:29:56.882ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
13362025-03-07T23:29:56.882ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
13372025-03-07T23:29:56.882ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
13382025-03-07T23:29:56.882ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13392025-03-07T23:29:56.882ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13402025-03-07T23:29:56.882ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13412025-03-07T23:29:56.883ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13422025-03-07T23:29:56.890ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "93929e27-7d1e-4a32-b6c5-9efafb805831", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
13432025-03-07T23:29:56.891ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
13442025-03-07T23:29:56.891ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13452025-03-07T23:29:56.891ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13462025-03-07T23:29:56.891ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13472025-03-07T23:29:56.892ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13482025-03-07T23:29:56.893ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13492025-03-07T23:29:56.901ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(())
13502025-03-07T23:29:56.901ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13512025-03-07T23:29:56.901ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13522025-03-07T23:29:56.902ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13532025-03-07T23:29:56.903ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13542025-03-07T23:29:56.903ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13552025-03-07T23:29:56.903ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13562025-03-07T23:29:56.904ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13572025-03-07T23:29:56.907ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13582025-03-07T23:29:56.921ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
13592025-03-07T23:29:56.922ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13602025-03-07T23:29:56.922ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13612025-03-07T23:29:56.923ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13622025-03-07T23:29:56.923ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") }
13632025-03-07T23:29:56.924ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13642025-03-07T23:29:56.924ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13652025-03-07T23:29:56.924ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13662025-03-07T23:29:56.925ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13672025-03-07T23:29:56.926ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6a5ebbc7-d9e8-4f26-b187-0c1a34a05b06", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
13682025-03-07T23:29:56.926ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
13692025-03-07T23:29:56.927ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13702025-03-07T23:29:56.932ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(())
13712025-03-07T23:29:56.935ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
13722025-03-07T23:29:56.935ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet
13732025-03-07T23:29:56.935ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13742025-03-07T23:29:56.935ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13752025-03-07T23:29:56.935ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13762025-03-07T23:29:56.936ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13772025-03-07T23:29:56.937ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3ebba6d5-9a19-427d-8ee1-7aafbb95702c", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:55 GMT"} })
13782025-03-07T23:29:56.938ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
13792025-03-07T23:29:56.938ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13802025-03-07T23:29:56.945ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
13812025-03-07T23:29:56.945ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13822025-03-07T23:29:56.945ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13832025-03-07T23:29:56.945ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13842025-03-07T23:29:56.946ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") }
13852025-03-07T23:29:56.946ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13862025-03-07T23:29:56.946ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13872025-03-07T23:29:56.946ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
13882025-03-07T23:29:56.947ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13892025-03-07T23:29:56.952ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13902025-03-07T23:29:56.956ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(())
13912025-03-07T23:29:56.956ZTRACtest_unauthorized (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-03-07T22:56:49.414306Z, time_modified: 2025-03-07T22:56:49.414306Z, allowed_ips: None } background_task = service_firewall_rule_propagation
13922025-03-07T23:29:56.956ZDEBGtest_unauthorized (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
13932025-03-07T23:29:56.956ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
13942025-03-07T23:29:56.956ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
13952025-03-07T23:29:56.968ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6d2ffd9c-2c87-4f32-b7bf-4e35ca5dfb4e", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
13962025-03-07T23:29:56.968ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
13972025-03-07T23:29:56.968ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
13982025-03-07T23:29:56.968ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13992025-03-07T23:29:56.968ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14002025-03-07T23:29:56.968ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14012025-03-07T23:29:56.969ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14022025-03-07T23:29:56.972ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8cad5061-49b1-471a-a042-485fee7793cd", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14032025-03-07T23:29:56.972ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
14042025-03-07T23:29:56.973ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14052025-03-07T23:29:56.984ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
14062025-03-07T23:29:56.991ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b113dc78-c8cf-495c-bf58-c5fca3a0cd00", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14072025-03-07T23:29:56.991ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
14082025-03-07T23:29:57.013ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d6419734-e7b4-4ff8-b384-33ecaaa5ca69", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14092025-03-07T23:29:57.013ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
14102025-03-07T23:29:57.014ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1f232339-d90e-47b5-82f5-3b37fa2b3f96", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14112025-03-07T23:29:57.014ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
14122025-03-07T23:29:57.015ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0d6ca9ed-b54a-4441-b26c-2eb24f58ed36", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14132025-03-07T23:29:57.015ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
14142025-03-07T23:29:57.037ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5c268672-a2e7-42db-92ee-588418780763", "content-length": "734", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14152025-03-07T23:29:57.038ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
14162025-03-07T23:29:57.040ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "12a4b226-cd03-480f-9e70-c630783ec672", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14172025-03-07T23:29:57.040ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
14182025-03-07T23:29:57.042ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "16dfd82f-bbae-4141-8bda-9b1d0c1e6e0e", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14192025-03-07T23:29:57.042ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
14202025-03-07T23:29:57.044ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fcbded61-da6c-4088-b09b-a61242d3fb74", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14212025-03-07T23:29:57.044ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
14222025-03-07T23:29:57.046ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "69527b92-4e6c-4274-be10-ab6bd7e0b99c", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14232025-03-07T23:29:57.046ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
14242025-03-07T23:29:57.047ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b91cd092-65a3-4b96-a934-33765a7cf321", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14252025-03-07T23:29:57.047ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
14262025-03-07T23:29:57.049ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8b836063-cfc4-4524-9213-595032457283", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14272025-03-07T23:29:57.049ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
14282025-03-07T23:29:57.050ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "73a31d86-1701-4bd6-9431-2dbd70f403fd", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14292025-03-07T23:29:57.050ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
14302025-03-07T23:29:57.052ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "75928094-c093-412a-b493-d62d08989c09", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14312025-03-07T23:29:57.052ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
14322025-03-07T23:29:57.054ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d56ff07e-fe23-408e-9244-043b8649df14", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14332025-03-07T23:29:57.054ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
14342025-03-07T23:29:57.055ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5e301e4e-cb5f-4c5a-8881-d2ce2b2ff578", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14352025-03-07T23:29:57.055ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
14362025-03-07T23:29:57.056ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "88961d57-0545-48ab-a284-bf9b7fa2b73d", "content-length": "723", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14372025-03-07T23:29:57.057ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
14382025-03-07T23:29:57.059ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "65b8a24b-e1cb-4ec2-a19f-365c5a3ad34b", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14392025-03-07T23:29:57.059ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
14402025-03-07T23:29:57.060ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "44bca455-7884-4d3e-9a71-85bfa2272969", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14412025-03-07T23:29:57.060ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
14422025-03-07T23:29:57.062ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "378501c1-697f-4227-ab2e-67cfb8ea351a", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14432025-03-07T23:29:57.062ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
14442025-03-07T23:29:57.067ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "060dd470-912e-4c1c-9331-832cf823aa37", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14452025-03-07T23:29:57.067ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
14462025-03-07T23:29:57.069ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "30949ffe-26f9-467f-897a-fa4c6c4d4111", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14472025-03-07T23:29:57.069ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
14482025-03-07T23:29:57.071ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cdf6cfb3-bc88-45be-8446-bb4a201daabe", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14492025-03-07T23:29:57.072ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
14502025-03-07T23:29:57.073ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6d190355-7b5c-464d-8871-61c972c24d10", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14512025-03-07T23:29:57.073ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
14522025-03-07T23:29:57.074ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3f6f14ec-0056-4f59-b1bc-a00b3847c0f7", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14532025-03-07T23:29:57.075ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
14542025-03-07T23:29:57.076ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d504a4c8-8199-4dc1-8304-aefecb68c0e0", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14552025-03-07T23:29:57.077ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
14562025-03-07T23:29:57.078ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c8bdbd67-8347-4cfc-b600-f30d535c5f9f", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14572025-03-07T23:29:57.078ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
14582025-03-07T23:29:57.079ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "65b12139-077f-4678-baf0-22b95bf36c2f", "content-length": "723", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14592025-03-07T23:29:57.080ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
14602025-03-07T23:29:57.081ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a040ae55-663f-42dd-88aa-06d49c28a872", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14612025-03-07T23:29:57.082ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
14622025-03-07T23:29:57.084ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fa2a6a37-7163-466d-a6c4-9fea85b32e48", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14632025-03-07T23:29:57.084ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
14642025-03-07T23:29:57.085ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "03da15b4-ea5a-4ae0-80d0-9e412dfdcbe9", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14652025-03-07T23:29:57.086ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
14662025-03-07T23:29:57.088ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a1d5e955-515e-454e-8f68-f0dc6442aeff", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14672025-03-07T23:29:57.088ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
14682025-03-07T23:29:57.092ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9077af11-7f0b-43fe-ba92-c1057c9089cc", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14692025-03-07T23:29:57.092ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
14702025-03-07T23:29:57.095ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
14712025-03-07T23:29:57.096ZDEBGtest_unauthorized (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
14722025-03-07T23:29:57.096ZINFOtest_unauthorized (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
14732025-03-07T23:29:57.096ZDEBGtest_unauthorized (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 3.881928191s
14742025-03-07T23:29:57.096ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 3.881971443s iteration = 1 status = {}
14752025-03-07T23:29:57.096ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1fa1c02d-7177-436f-a5e6-f1ce9bd50ac3", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14762025-03-07T23:29:57.096ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
14772025-03-07T23:29:57.098ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ea1e190-8e66-415d-a255-7bd4c0c1f361", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14782025-03-07T23:29:57.098ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
14792025-03-07T23:29:57.099ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "677274f0-c353-43b9-8547-bb79354806d0", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14802025-03-07T23:29:57.099ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
14812025-03-07T23:29:57.100ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "30f500f2-98cc-484b-9eb0-a706d19ecea5", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14822025-03-07T23:29:57.101ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
14832025-03-07T23:29:57.102ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7789ce4a-325c-44a4-aff3-c49b0340b9b3", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
14842025-03-07T23:29:57.102ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
14852025-03-07T23:29:57.102ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14862025-03-07T23:29:57.102ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14872025-03-07T23:29:57.102ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14882025-03-07T23:29:57.103ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14892025-03-07T23:29:57.126ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14902025-03-07T23:29:57.154ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
14912025-03-07T23:29:57.154ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
14922025-03-07T23:29:57.154ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14932025-03-07T23:29:57.154ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14942025-03-07T23:29:57.154ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14952025-03-07T23:29:57.155ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14962025-03-07T23:29:57.188ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14972025-03-07T23:29:57.195ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
14982025-03-07T23:29:57.195ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14992025-03-07T23:29:57.195ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
15002025-03-07T23:29:57.195ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
15012025-03-07T23:29:57.294ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
15022025-03-07T23:29:57.294ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
15032025-03-07T23:29:57.295ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:38588 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
15042025-03-07T23:29:57.295ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:38588 req_id = d66ca00d-6a23-412e-af13-8d6eec65b427 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
15052025-03-07T23:29:57.296ZINFOtest_unauthorized (dropshot): request completed latency_us = 718 local_addr = [::1]:57532 method = GET remote_addr = [::1]:38588 req_id = d66ca00d-6a23-412e-af13-8d6eec65b427 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
15062025-03-07T23:29:57.296ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "d66ca00d-6a23-412e-af13-8d6eec65b427", "content-length": "2769", "date": "Fri, 07 Mar 2025 23:29:56 GMT"} })
15072025-03-07T23:29:57.298ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
15082025-03-07T23:29:57.298ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
15092025-03-07T23:29:57.298ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
15102025-03-07T23:29:57.300ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
15112025-03-07T23:29:57.301ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15122025-03-07T23:29:57.301ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
15132025-03-07T23:29:57.301ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
15142025-03-07T23:29:57.301ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
15152025-03-07T23:29:57.306ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15162025-03-07T23:29:57.315ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
15172025-03-07T23:29:57.315ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
15182025-03-07T23:29:57.316ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
15192025-03-07T23:29:57.316ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
15202025-03-07T23:29:57.488ZINFOtest_unauthorized (InternalApi): inserted blueprint blueprint_id = d650e231-b16e-4852-836f-d1272975761d
15212025-03-07T23:29:57.488ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
15222025-03-07T23:29:57.488ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15232025-03-07T23:29:57.488ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15242025-03-07T23:29:57.488ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15252025-03-07T23:29:57.488ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15262025-03-07T23:29:57.504ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15272025-03-07T23:29:57.515ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
15282025-03-07T23:29:57.627ZINFOtest_unauthorized (InternalApi): Inserted networking records for external_dns service
15292025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): Inserted networking records for nexus service
15302025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): No networking records needed for crucible_pantry service
15312025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): No networking records needed for cockroach_db service
15322025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): No networking records needed for clickhouse service
15332025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): No networking records needed for internal_dns service
15342025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): Inserted service networking records
15352025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): Inserted physical disks
15362025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): Inserted zpools
15372025-03-07T23:29:57.670ZINFOtest_unauthorized (InternalApi): Inserted datasets
15382025-03-07T23:29:57.718ZINFOtest_unauthorized (InternalApi): Populated DNS tables for internal DNS
15392025-03-07T23:29:57.728ZINFOtest_unauthorized (InternalApi): Populated DNS tables for external DNS
15402025-03-07T23:29:57.728ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15412025-03-07T23:29:57.728ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15422025-03-07T23:29:57.728ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15432025-03-07T23:29:57.728ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15442025-03-07T23:29:57.729ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15452025-03-07T23:29:57.732ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15462025-03-07T23:29:57.737ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15472025-03-07T23:29:57.744ZTRACtest_unauthorized (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15482025-03-07T23:29:57.744ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15492025-03-07T23:29:57.745ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15502025-03-07T23:29:57.745ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15512025-03-07T23:29:57.745ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15522025-03-07T23:29:57.752ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15532025-03-07T23:29:57.761ZDEBGtest_unauthorized (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15542025-03-07T23:29:57.802ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15552025-03-07T23:29:57.802ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15562025-03-07T23:29:57.802ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15572025-03-07T23:29:57.802ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15582025-03-07T23:29:57.803ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15592025-03-07T23:29:57.811ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15602025-03-07T23:29:57.820ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15612025-03-07T23:29:57.820ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15622025-03-07T23:29:57.820ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15632025-03-07T23:29:57.820ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15642025-03-07T23:29:57.820ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15652025-03-07T23:29:57.821ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15662025-03-07T23:29:57.830ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15672025-03-07T23:29:57.838ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15682025-03-07T23:29:57.842ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15692025-03-07T23:29:57.842ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15702025-03-07T23:29:57.842ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15712025-03-07T23:29:57.842ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15722025-03-07T23:29:57.843ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15732025-03-07T23:29:57.849ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15742025-03-07T23:29:57.857ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15752025-03-07T23:29:57.872ZINFOtest_unauthorized (InternalApi): Created recovery silo
15762025-03-07T23:29:57.874ZINFOtest_unauthorized (InternalApi): Created recovery user
15772025-03-07T23:29:57.880ZINFOtest_unauthorized (InternalApi): Created recovery user's password
15782025-03-07T23:29:57.880ZTRACtest_unauthorized (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 639f343f-2784-45fa-9934-45010d5cb460, lookup_type: ById(639f343f-2784-45fa-9934-45010d5cb460) }
15792025-03-07T23:29:57.880ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 639f343f-2784-45fa-9934-45010d5cb460 resource_type = Silo
15802025-03-07T23:29:57.880ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15812025-03-07T23:29:57.880ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15822025-03-07T23:29:57.881ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15832025-03-07T23:29:57.884ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15842025-03-07T23:29:57.884ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15852025-03-07T23:29:57.884ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15862025-03-07T23:29:57.885ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15872025-03-07T23:29:57.886ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15882025-03-07T23:29:57.889ZDEBGtest_unauthorized (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 639f343f-2784-45fa-9934-45010d5cb460, lookup_type: ById(639f343f-2784-45fa-9934-45010d5cb460) } result = Ok(())
15892025-03-07T23:29:57.889ZDEBGtest_unauthorized (InternalApi): Generated role assignment queries
15902025-03-07T23:29:57.897ZINFOtest_unauthorized (InternalApi): Granted Silo privileges
15912025-03-07T23:29:57.897ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15922025-03-07T23:29:57.897ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15932025-03-07T23:29:57.897ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15942025-03-07T23:29:57.897ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15952025-03-07T23:29:57.899ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15962025-03-07T23:29:57.927ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15972025-03-07T23:29:57.930ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15982025-03-07T23:29:57.947ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 5451549d-bcf7-4193-a1a6-8ba2254b9fb4
15992025-03-07T23:29:57.948ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 5451549d-bcf7-4193-a1a6-8ba2254b9fb4 time_started = 2025-03-07 23:29:56.562871 UTC
16002025-03-07T23:29:57.948ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 3.818962512s iteration = 2 status = {"collection_id":"5451549d-bcf7-4193-a1a6-8ba2254b9fb4","time_done":"2025-03-07 23:29:57.298852 UTC","time_started":"2025-03-07 23:29:56.562871 UTC"}
16012025-03-07T23:29:57.948ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
16022025-03-07T23:29:57.948ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 19.776\u{b5}s iteration = 2 status = {"error":"task disabled"}
16032025-03-07T23:29:57.948ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 2 reason = Dependency
16042025-03-07T23:29:57.948ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
16052025-03-07T23:29:57.948ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 19.615\u{b5}s iteration = 2 status = {"error":"no blueprint"}
16062025-03-07T23:29:57.950ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16072025-03-07T23:29:57.950ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16082025-03-07T23:29:57.951ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16092025-03-07T23:29:57.953ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16102025-03-07T23:29:57.953ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16112025-03-07T23:29:57.954ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16122025-03-07T23:29:57.959ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16132025-03-07T23:29:57.959ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16142025-03-07T23:29:57.960ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16152025-03-07T23:29:57.961ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16162025-03-07T23:29:57.961ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16172025-03-07T23:29:57.961ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16182025-03-07T23:29:57.961ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16192025-03-07T23:29:57.962ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16202025-03-07T23:29:57.964ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16212025-03-07T23:29:57.964ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16222025-03-07T23:29:57.964ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16232025-03-07T23:29:57.964ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16242025-03-07T23:29:57.968ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16252025-03-07T23:29:57.968ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16262025-03-07T23:29:57.969ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16272025-03-07T23:29:57.970ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16282025-03-07T23:29:57.972ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16292025-03-07T23:29:57.989ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16302025-03-07T23:29:57.989ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
16312025-03-07T23:29:57.989ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16322025-03-07T23:29:57.989ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16332025-03-07T23:29:57.990ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16342025-03-07T23:29:57.990ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16352025-03-07T23:29:57.991ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16362025-03-07T23:29:57.996ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16372025-03-07T23:29:57.998ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16382025-03-07T23:29:57.998ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16392025-03-07T23:29:57.998ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16402025-03-07T23:29:58.001ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16412025-03-07T23:29:58.002ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16422025-03-07T23:29:58.002ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16432025-03-07T23:29:58.002ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16442025-03-07T23:29:58.005ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16452025-03-07T23:29:58.067ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16462025-03-07T23:29:58.067ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16472025-03-07T23:29:58.067ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16482025-03-07T23:29:58.068ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16492025-03-07T23:29:58.072ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16502025-03-07T23:29:58.072ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16512025-03-07T23:29:58.088ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16522025-03-07T23:29:58.090ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16532025-03-07T23:29:58.090ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16542025-03-07T23:29:58.090ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16552025-03-07T23:29:58.095ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16562025-03-07T23:29:58.095ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16572025-03-07T23:29:58.095ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16582025-03-07T23:29:58.096ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16592025-03-07T23:29:58.096ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16602025-03-07T23:29:58.096ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16612025-03-07T23:29:58.096ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16622025-03-07T23:29:58.097ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16632025-03-07T23:29:58.100ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16642025-03-07T23:29:58.100ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16652025-03-07T23:29:58.101ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16662025-03-07T23:29:58.102ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16672025-03-07T23:29:58.113ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16682025-03-07T23:29:58.113ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16692025-03-07T23:29:58.113ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16702025-03-07T23:29:58.114ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16712025-03-07T23:29:58.122ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16722025-03-07T23:29:58.148ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16732025-03-07T23:29:58.148ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
16742025-03-07T23:29:58.148ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16752025-03-07T23:29:58.148ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16762025-03-07T23:29:58.152ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16772025-03-07T23:29:58.157ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16782025-03-07T23:29:58.157ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16792025-03-07T23:29:58.159ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16802025-03-07T23:29:58.159ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16812025-03-07T23:29:58.161ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16822025-03-07T23:29:58.161ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16832025-03-07T23:29:58.166ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16842025-03-07T23:29:58.166ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16852025-03-07T23:29:58.167ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16862025-03-07T23:29:58.169ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
16872025-03-07T23:29:58.170ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16882025-03-07T23:29:58.170ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16892025-03-07T23:29:58.170ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16902025-03-07T23:29:58.170ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16912025-03-07T23:29:58.178ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16922025-03-07T23:29:58.178ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16932025-03-07T23:29:58.179ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16942025-03-07T23:29:58.187ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16952025-03-07T23:29:58.195ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16962025-03-07T23:29:58.195ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16972025-03-07T23:29:58.195ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16982025-03-07T23:29:58.198ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16992025-03-07T23:29:58.200ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17002025-03-07T23:29:58.210ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17012025-03-07T23:29:58.211ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17022025-03-07T23:29:58.211ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
17032025-03-07T23:29:58.211ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17042025-03-07T23:29:58.211ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17052025-03-07T23:29:58.211ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17062025-03-07T23:29:58.211ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17072025-03-07T23:29:58.213ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17082025-03-07T23:29:58.213ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17092025-03-07T23:29:58.213ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17102025-03-07T23:29:58.214ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17112025-03-07T23:29:58.215ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17122025-03-07T23:29:58.215ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17132025-03-07T23:29:58.215ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17142025-03-07T23:29:58.217ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17152025-03-07T23:29:58.229ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17162025-03-07T23:29:58.297ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17172025-03-07T23:29:58.297ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17182025-03-07T23:29:58.297ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17192025-03-07T23:29:58.298ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17202025-03-07T23:29:58.314ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17212025-03-07T23:29:58.314ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17222025-03-07T23:29:58.321ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17232025-03-07T23:29:58.326ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17242025-03-07T23:29:58.326ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17252025-03-07T23:29:58.327ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17262025-03-07T23:29:58.331ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17272025-03-07T23:29:58.331ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17282025-03-07T23:29:58.332ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17292025-03-07T23:29:58.335ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17302025-03-07T23:29:58.335ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17312025-03-07T23:29:58.336ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17322025-03-07T23:29:58.339ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17332025-03-07T23:29:58.339ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17342025-03-07T23:29:58.339ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17352025-03-07T23:29:58.339ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17362025-03-07T23:29:58.339ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17372025-03-07T23:29:58.343ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17382025-03-07T23:29:58.343ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17392025-03-07T23:29:58.343ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17402025-03-07T23:29:58.344ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17412025-03-07T23:29:58.348ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17422025-03-07T23:29:58.348ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17432025-03-07T23:29:58.348ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17442025-03-07T23:29:58.349ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17452025-03-07T23:29:58.357ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17462025-03-07T23:29:58.382ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17472025-03-07T23:29:58.382ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17482025-03-07T23:29:58.383ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17492025-03-07T23:29:58.383ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17502025-03-07T23:29:58.383ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17512025-03-07T23:29:58.383ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17522025-03-07T23:29:58.384ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17532025-03-07T23:29:58.403ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17542025-03-07T23:29:58.403ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17552025-03-07T23:29:58.403ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17562025-03-07T23:29:58.405ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17572025-03-07T23:29:58.409ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17582025-03-07T23:29:58.409ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17592025-03-07T23:29:58.409ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17602025-03-07T23:29:58.410ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17612025-03-07T23:29:58.412ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17622025-03-07T23:29:58.433ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17632025-03-07T23:29:58.433ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17642025-03-07T23:29:58.433ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17652025-03-07T23:29:58.434ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17662025-03-07T23:29:58.451ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 55f7daeb-467c-43a6-8ca8-6af4cf01d42e, kind: Service { id: 2020e185-cc36-4881-9ae7-262f444268e3 }, name: Name("external-dns-2020e185-cc36-4881-9ae7-262f444268e3"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: b978e34c-a236-4eeb-8f4f-94355eab47b8, kind: Service { id: 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af }, name: Name("nexus-2d8d1c15-8782-4d4a-a8ba-3818fa1c29af"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
17672025-03-07T23:29:58.452ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
17682025-03-07T23:29:58.452ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17692025-03-07T23:29:58.452ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17702025-03-07T23:29:58.452ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17712025-03-07T23:29:58.453ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17722025-03-07T23:29:58.455ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17732025-03-07T23:29:58.461ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
17742025-03-07T23:29:58.462ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17752025-03-07T23:29:58.462ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17762025-03-07T23:29:58.462ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17772025-03-07T23:29:58.465ZTRACtest_unauthorized (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-03-07T22:56:49.414306Z, time_modified: 2025-03-07T23:29:57.930477Z, allowed_ips: None }
17782025-03-07T23:29:58.465ZDEBGtest_unauthorized (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
17792025-03-07T23:29:58.468ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 55f7daeb-467c-43a6-8ca8-6af4cf01d42e, kind: Service { id: 2020e185-cc36-4881-9ae7-262f444268e3 }, name: Name("external-dns-2020e185-cc36-4881-9ae7-262f444268e3"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b978e34c-a236-4eeb-8f4f-94355eab47b8, kind: Service { id: 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af }, name: Name("nexus-2d8d1c15-8782-4d4a-a8ba-3818fa1c29af"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
17802025-03-07T23:29:58.468ZDEBGtest_unauthorized (nexus): resolved 2 rules for sleds
17812025-03-07T23:29:58.563ZDEBGtest_unauthorized (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-07T23:29:53.229291Z, time_modified: 2025-03-07T23:29:53.229291Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(57532), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(58969) }]
17822025-03-07T23:29:58.564ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
17832025-03-07T23:29:58.564ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
17842025-03-07T23:29:58.564ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
17852025-03-07T23:29:58.565ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
17862025-03-07T23:29:58.570ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
17872025-03-07T23:29:58.570ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17882025-03-07T23:29:58.570ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
17892025-03-07T23:29:58.570ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
17902025-03-07T23:29:58.574ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
17912025-03-07T23:29:58.577ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
17922025-03-07T23:29:58.589ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
17932025-03-07T23:29:58.698ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:57532/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
17942025-03-07T23:29:58.698ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:63916 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
17952025-03-07T23:29:58.699ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:63916 req_id = 6842f1c1-f3bf-4fd2-bbdf-0243dae46f72 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
17962025-03-07T23:29:58.700ZINFOtest_unauthorized (dropshot): request completed latency_us = 1173 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:63916 req_id = 6842f1c1-f3bf-4fd2-bbdf-0243dae46f72 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
17972025-03-07T23:29:58.700ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:57532/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "6842f1c1-f3bf-4fd2-bbdf-0243dae46f72", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
17982025-03-07T23:29:58.702ZINFOtest_unauthorized (nexus): updated firewall rules on 1 sleds
17992025-03-07T23:29:58.702ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18002025-03-07T23:29:58.702ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {} }
18012025-03-07T23:29:58.703ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18022025-03-07T23:29:58.703ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
18032025-03-07T23:29:58.703ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
18042025-03-07T23:29:58.703ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18052025-03-07T23:29:58.703ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18062025-03-07T23:29:58.704ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18072025-03-07T23:29:58.704ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
18082025-03-07T23:29:58.704ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
18092025-03-07T23:29:58.704ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
18102025-03-07T23:29:58.704ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
18112025-03-07T23:29:58.704ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
18122025-03-07T23:29:58.704ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
18132025-03-07T23:29:58.704ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
18142025-03-07T23:29:58.705ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
18152025-03-07T23:29:58.705ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
18162025-03-07T23:29:58.705ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
18172025-03-07T23:29:58.705ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
18182025-03-07T23:29:58.705ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18192025-03-07T23:29:58.705ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
18202025-03-07T23:29:58.705ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
18212025-03-07T23:29:58.706ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
18222025-03-07T23:29:58.706ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
18232025-03-07T23:29:58.706ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
18242025-03-07T23:29:58.706ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18252025-03-07T23:29:58.706ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
18262025-03-07T23:29:58.706ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
18272025-03-07T23:29:58.706ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
18282025-03-07T23:29:58.707ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 6c 85 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 l............_na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:63751 req_id = 702045fa-1f46-4616-ba79-977b86443e7b
18292025-03-07T23:29:58.707ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 27781,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63751 req_id = 702045fa-1f46-4616-ba79-977b86443e7b
18302025-03-07T23:29:58.707ZDEBGtest_unauthorized (store): query key key = _nameservice._tcp
18312025-03-07T23:29:58.707ZDEBGtest_unauthorized (store): query key key = c01c014b-4287-4af4-b66b-41095bf7841f.host
18322025-03-07T23:29:58.708ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:63751 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 48967, target: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal") })) }] req_id = 702045fa-1f46-4616-ba79-977b86443e7b
18332025-03-07T23:29:58.708ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: c3 1b 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:64042 req_id = 9f1015ef-3dce-48bd-bb8f-eafb5d4c6ec6
18342025-03-07T23:29:58.708ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49947,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64042 req_id = 9f1015ef-3dce-48bd-bb8f-eafb5d4c6ec6
18352025-03-07T23:29:58.708ZDEBGtest_unauthorized (store): query key key = _external-dns._tcp
18362025-03-07T23:29:58.708ZDEBGtest_unauthorized (store): query key key = 2020e185-cc36-4881-9ae7-262f444268e3.host
18372025-03-07T23:29:58.708ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:64042 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39729, target: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal") })) }] req_id = 9f1015ef-3dce-48bd-bb8f-eafb5d4c6ec6
18382025-03-07T23:29:58.715ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 48967, target: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3895, tv_nsec: 256333433 } })
18392025-03-07T23:29:58.715ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
18402025-03-07T23:29:58.715ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39729, target: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3895, tv_nsec: 262809502 } })
18412025-03-07T23:29:58.716ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
18422025-03-07T23:29:58.716ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
18432025-03-07T23:29:58.716ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18442025-03-07T23:29:58.716ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18452025-03-07T23:29:58.716ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18462025-03-07T23:29:58.719ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18472025-03-07T23:29:58.719ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
18482025-03-07T23:29:58.719ZTRACtest_unauthorized (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18492025-03-07T23:29:58.719ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18502025-03-07T23:29:58.719ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {} }
18512025-03-07T23:29:58.720ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18522025-03-07T23:29:58.720ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
18532025-03-07T23:29:58.720ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18542025-03-07T23:29:58.720ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
18552025-03-07T23:29:58.721ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
18562025-03-07T23:29:58.721ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
18572025-03-07T23:29:58.722ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: f2 3e 01 00 00 01 00 00 00 00 00 01 24 63 30 31 .>..........$c01\n0010: 63 30 31 34 62 2d 34 32 38 37 2d 34 61 66 34 2d c014b-4287-4af4-\n0020: 62 36 36 62 2d 34 31 30 39 35 62 66 37 38 34 31 b66b-41095bf7841\n0030: 66 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 f.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:54329 req_id = e12eba44-19f2-4942-8d70-42015a99b2f4
18582025-03-07T23:29:58.722ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 62014,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 99,\n 48,\n 49,\n 99,\n 48,\n 49,\n 52,\n 98,\n 45,\n 52,\n 50,\n 56,\n 55,\n 45,\n 52,\n 97,\n 102,\n 52,\n 45,\n 98,\n 54,\n 54,\n 98,\n 45,\n 52,\n 49,\n 48,\n 57,\n 53,\n 98,\n 102,\n 55,\n 56,\n 52,\n 49,\n 102,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54329 req_id = e12eba44-19f2-4942-8d70-42015a99b2f4
18592025-03-07T23:29:58.722ZDEBGtest_unauthorized (store): query key key = c01c014b-4287-4af4-b66b-41095bf7841f.host
18602025-03-07T23:29:58.722ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:54329 query = LowerQuery { name: LowerName(Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal.")), original: Query { name: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = e12eba44-19f2-4942-8d70-42015a99b2f4
18612025-03-07T23:29:58.722ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 73 54 01 00 00 01 00 00 00 00 00 01 24 32 30 32 sT..........$202\n0010: 30 65 31 38 35 2d 63 63 33 36 2d 34 38 38 31 2d 0e185-cc36-4881-\n0020: 39 61 65 37 2d 32 36 32 66 34 34 34 32 36 38 65 9ae7-262f444268e\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:56590 req_id = d9e1f75b-99a5-46a5-a426-b8b4109a6725
18622025-03-07T23:29:58.723ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 29524,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 50,\n 48,\n 50,\n 48,\n 101,\n 49,\n 56,\n 53,\n 45,\n 99,\n 99,\n 51,\n 54,\n 45,\n 52,\n 56,\n 56,\n 49,\n 45,\n 57,\n 97,\n 101,\n 55,\n 45,\n 50,\n 54,\n 50,\n 102,\n 52,\n 52,\n 52,\n 50,\n 54,\n 56,\n 101,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56590 req_id = d9e1f75b-99a5-46a5-a426-b8b4109a6725
18632025-03-07T23:29:58.723ZDEBGtest_unauthorized (store): query key key = 2020e185-cc36-4881-9ae7-262f444268e3.host
18642025-03-07T23:29:58.723ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:56590 query = LowerQuery { name: LowerName(Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal.")), original: Query { name: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = d9e1f75b-99a5-46a5-a426-b8b4109a6725
18652025-03-07T23:29:58.725ZINFOtest_unauthorized (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:48967] } background_task = dns_servers_internal dns_group = internal
18662025-03-07T23:29:58.725ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 20.949495ms iteration = 2 status = {"addresses":["[::1]:48967"]}
18672025-03-07T23:29:58.725ZINFOtest_unauthorized (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:39729] } background_task = dns_servers_external dns_group = external
18682025-03-07T23:29:58.725ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 20.254801ms iteration = 2 status = {"addresses":["[::1]:39729"]}
18692025-03-07T23:29:58.725ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
18702025-03-07T23:29:58.725ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config
18712025-03-07T23:29:58.725ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 26.067\u{b5}s iteration = 2 status = {"error":"no config"}
18722025-03-07T23:29:58.725ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
18732025-03-07T23:29:58.725ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config
18742025-03-07T23:29:58.725ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 16.855\u{b5}s iteration = 2 status = {"error":"no config"}
18752025-03-07T23:29:58.726ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18762025-03-07T23:29:58.733ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
18772025-03-07T23:29:58.733ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
18782025-03-07T23:29:58.733ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
18792025-03-07T23:29:58.733ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
18802025-03-07T23:29:58.734ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18812025-03-07T23:29:58.738ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
18822025-03-07T23:29:58.738ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
18832025-03-07T23:29:58.738ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
18842025-03-07T23:29:58.739ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
18852025-03-07T23:29:58.739ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18862025-03-07T23:29:58.746ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
18872025-03-07T23:29:58.748ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
18882025-03-07T23:29:58.749ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
18892025-03-07T23:29:58.749ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
18902025-03-07T23:29:58.749ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
18912025-03-07T23:29:58.749ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18922025-03-07T23:29:58.749ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18932025-03-07T23:29:58.749ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18942025-03-07T23:29:58.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18952025-03-07T23:29:58.752ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18962025-03-07T23:29:58.760ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
18972025-03-07T23:29:58.760ZINFOtest_unauthorized (nexus): Rack initialized
18982025-03-07T23:29:58.760ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18992025-03-07T23:29:58.760ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19002025-03-07T23:29:58.765ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19012025-03-07T23:29:58.766ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19022025-03-07T23:29:58.778ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19032025-03-07T23:29:58.779ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
19042025-03-07T23:29:58.779ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19052025-03-07T23:29:58.779ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19062025-03-07T23:29:58.779ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19072025-03-07T23:29:58.780ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19082025-03-07T23:29:58.786ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
19092025-03-07T23:29:58.786ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
19102025-03-07T23:29:58.786ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
19112025-03-07T23:29:58.786ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19122025-03-07T23:29:58.786ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19132025-03-07T23:29:58.786ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19142025-03-07T23:29:58.786ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19152025-03-07T23:29:58.787ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19162025-03-07T23:29:58.787ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(5451549d-bcf7-4193-a1a6-8ba2254b9fb4, 0)]
19172025-03-07T23:29:58.787ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
19182025-03-07T23:29:58.788ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19192025-03-07T23:29:58.807ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19202025-03-07T23:29:58.807ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19212025-03-07T23:29:58.807ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19222025-03-07T23:29:58.807ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19232025-03-07T23:29:58.809ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19242025-03-07T23:29:58.822ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
19252025-03-07T23:29:58.822ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19262025-03-07T23:29:58.822ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19272025-03-07T23:29:58.822ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19282025-03-07T23:29:58.823ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19292025-03-07T23:29:58.823ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19302025-03-07T23:29:58.823ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19312025-03-07T23:29:58.828ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: ff 6f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .o..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:61142 req_id = e99d652b-bb67-4671-a755-9eddd7761a69
19322025-03-07T23:29:58.828ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 65391,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61142 req_id = e99d652b-bb67-4671-a755-9eddd7761a69
19332025-03-07T23:29:58.828ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
19342025-03-07T23:29:58.828ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
19352025-03-07T23:29:58.829ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:61142 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = e99d652b-bb67-4671-a755-9eddd7761a69
19362025-03-07T23:29:58.829ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19372025-03-07T23:29:58.836ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19382025-03-07T23:29:58.837ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19392025-03-07T23:29:58.837ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19402025-03-07T23:29:58.837ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19412025-03-07T23:29:58.837ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
19422025-03-07T23:29:58.837ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 6a3363bb-3891-49d1-a620-cb1be142b908 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
19432025-03-07T23:29:58.837ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
19442025-03-07T23:29:58.837ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19452025-03-07T23:29:58.837ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19462025-03-07T23:29:58.838ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19472025-03-07T23:29:58.838ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19482025-03-07T23:29:58.839ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3895, tv_nsec: 386644070 } })
19492025-03-07T23:29:58.839ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
19502025-03-07T23:29:58.847ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19512025-03-07T23:29:58.847ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19522025-03-07T23:29:58.848ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19532025-03-07T23:29:58.848ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: d5 98 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:65489 req_id = a2890546-f56a-486f-89cf-c845c2874004
19542025-03-07T23:29:58.848ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54680,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65489 req_id = a2890546-f56a-486f-89cf-c845c2874004
19552025-03-07T23:29:58.848ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
19562025-03-07T23:29:58.849ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:65489 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = a2890546-f56a-486f-89cf-c845c2874004
19572025-03-07T23:29:58.960ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
19582025-03-07T23:29:58.985ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
19592025-03-07T23:29:58.985ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 1c466382-26d9-4eba-a972-8bc97483988b dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
19602025-03-07T23:29:58.986ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19612025-03-07T23:29:58.986ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19622025-03-07T23:29:58.986ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19632025-03-07T23:29:58.986ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19642025-03-07T23:29:58.989ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19652025-03-07T23:29:58.989ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
19662025-03-07T23:29:58.989ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19672025-03-07T23:29:58.990ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19682025-03-07T23:29:58.990ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19692025-03-07T23:29:58.990ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19702025-03-07T23:29:58.993ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19712025-03-07T23:29:59.019ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19722025-03-07T23:29:59.019ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19732025-03-07T23:29:59.019ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19742025-03-07T23:29:59.031ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19752025-03-07T23:29:59.035ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19762025-03-07T23:29:59.043ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19772025-03-07T23:29:59.044ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19782025-03-07T23:29:59.044ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19792025-03-07T23:29:59.044ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19802025-03-07T23:29:59.045ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19812025-03-07T23:29:59.051ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
19822025-03-07T23:29:59.051ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19832025-03-07T23:29:59.051ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19842025-03-07T23:29:59.052ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19852025-03-07T23:29:59.053ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 6a3363bb-3891-49d1-a620-cb1be142b908 dns_zone_name = control-plane.oxide.internal found_so_far = 18 version = 1
19862025-03-07T23:29:59.053ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
19872025-03-07T23:29:59.053ZINFOtest_unauthorized (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
19882025-03-07T23:29:59.053ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 350.163062ms iteration = 2 status = {"generation":1}
19892025-03-07T23:29:59.053ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
19902025-03-07T23:29:59.198ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:48967 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:48967] } uri = http://[::1]:48967/config
19912025-03-07T23:29:59.224ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 1c466382-26d9-4eba-a972-8bc97483988b dns_zone_name = oxide-dev.test found_so_far = 1 version = 2
19922025-03-07T23:29:59.224ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
19932025-03-07T23:29:59.224ZINFOtest_unauthorized (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
19942025-03-07T23:29:59.224ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 520.02098ms iteration = 2 status = {"generation":2}
19952025-03-07T23:29:59.224ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
19962025-03-07T23:29:59.374ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:39729 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:39729] } uri = http://[::1]:39729/config
19972025-03-07T23:29:59.392ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:29:51.209697Z, time_modified: 2025-03-07T23:29:51.209697Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
19982025-03-07T23:29:59.406ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 700.784823ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]}},"default_endpoint":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 639f343f-2784-45fa-9934-45010d5cb460 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
19992025-03-07T23:29:59.411ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20002025-03-07T23:29:59.411ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20012025-03-07T23:29:59.411ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20022025-03-07T23:29:59.411ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20032025-03-07T23:29:59.412ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20042025-03-07T23:29:59.418ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:48967 remote_addr = [::1]:56856
20052025-03-07T23:29:59.421ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:39729 remote_addr = [::1]:34645
20062025-03-07T23:29:59.432ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: a4 f3 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:52370 req_id = 54608dfc-cddc-4958-af9a-d8eba03d4c60
20072025-03-07T23:29:59.433ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 42227,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52370 req_id = 54608dfc-cddc-4958-af9a-d8eba03d4c60
20082025-03-07T23:29:59.437ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
20092025-03-07T23:29:59.438ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 42227, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:52370 req_id = 54608dfc-cddc-4958-af9a-d8eba03d4c60
20102025-03-07T23:29:59.450ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
20112025-03-07T23:29:59.450ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
20122025-03-07T23:29:59.450ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
20132025-03-07T23:29:59.451ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:48967 method = PUT remote_addr = [::1]:56856 req_id = 88eb42a0-900f-4e30-a9a7-e0e3ef969181 uri = /config
20142025-03-07T23:29:59.451ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:39729 method = PUT remote_addr = [::1]:34645 req_id = 4a5c819d-4b41-4f17-83a6-53209775ce12 uri = /config
20152025-03-07T23:29:59.452ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = 88eb42a0-900f-4e30-a9a7-e0e3ef969181
20162025-03-07T23:29:59.459ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = 88eb42a0-900f-4e30-a9a7-e0e3ef969181
20172025-03-07T23:29:59.459ZINFOtest_unauthorized (store): attempting generation update new_generation = 2 req_id = 4a5c819d-4b41-4f17-83a6-53209775ce12
20182025-03-07T23:29:59.459ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
20192025-03-07T23:29:59.459ZDEBGtest_unauthorized (store): creating tree tree_name = generation_2_zone_oxide-dev.test
20202025-03-07T23:29:59.461ZDEBGtest_unauthorized (store): updating current config
20212025-03-07T23:29:59.461ZDEBGtest_unauthorized (store): flushing default tree
20222025-03-07T23:29:59.461ZINFOtest_unauthorized (store): pruning trees for generations older than 2 keep = 3
20232025-03-07T23:29:59.461ZINFOtest_unauthorized (store): updated generation new_generation = 2 req_id = 4a5c819d-4b41-4f17-83a6-53209775ce12
20242025-03-07T23:29:59.462ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 10743 local_addr = [::1]:48967 method = PUT remote_addr = [::1]:56856 req_id = 88eb42a0-900f-4e30-a9a7-e0e3ef969181 response_code = 204 uri = /config
20252025-03-07T23:29:59.462ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 10568 local_addr = [::1]:39729 method = PUT remote_addr = [::1]:34645 req_id = 4a5c819d-4b41-4f17-83a6-53209775ce12 response_code = 204 uri = /config
20262025-03-07T23:29:59.462ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20272025-03-07T23:29:59.462ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20282025-03-07T23:29:59.462ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20292025-03-07T23:29:59.463ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20302025-03-07T23:29:59.467ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:48967 generation = 1 result = Ok(Response { url: "http://[::1]:48967/config", status: 204, headers: {"x-request-id": "88eb42a0-900f-4e30-a9a7-e0e3ef969181", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} }) servers = DnsServersList { addresses: [[::1]:48967] }
20312025-03-07T23:29:59.467ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:48967 generation = 1 servers = DnsServersList { addresses: [[::1]:48967] }
20322025-03-07T23:29:59.469ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:48967] }
20332025-03-07T23:29:59.469ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 415.783067ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:48967":{"Ok":null}}}
20342025-03-07T23:29:59.469ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:39729 generation = 2 result = Ok(Response { url: "http://[::1]:39729/config", status: 204, headers: {"x-request-id": "4a5c819d-4b41-4f17-83a6-53209775ce12", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} }) servers = DnsServersList { addresses: [[::1]:39729] }
20352025-03-07T23:29:59.469ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:39729 generation = 2 servers = DnsServersList { addresses: [[::1]:39729] }
20362025-03-07T23:29:59.471ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:39729] }
20372025-03-07T23:29:59.471ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 247.171728ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:39729":{"Ok":null}}}
20382025-03-07T23:29:59.478ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20392025-03-07T23:29:59.478ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20402025-03-07T23:29:59.478ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20412025-03-07T23:29:59.481ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20422025-03-07T23:29:59.491ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc57db06-f239-4954-bd1e-f4176a3f5938", "content-length": "835", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20432025-03-07T23:29:59.491ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
20442025-03-07T23:29:59.491ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20452025-03-07T23:29:59.503ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20462025-03-07T23:29:59.503ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
20472025-03-07T23:29:59.503ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20482025-03-07T23:29:59.503ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20492025-03-07T23:29:59.503ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20502025-03-07T23:29:59.503ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20512025-03-07T23:29:59.503ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20522025-03-07T23:29:59.506ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ee1d5161-6822-45e3-aca7-673d3ce66a2b", "content-length": "734", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20532025-03-07T23:29:59.506ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
20542025-03-07T23:29:59.506ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20552025-03-07T23:29:59.508ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20562025-03-07T23:29:59.508ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20572025-03-07T23:29:59.509ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20582025-03-07T23:29:59.511ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20592025-03-07T23:29:59.511ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20602025-03-07T23:29:59.511ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20612025-03-07T23:29:59.512ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20622025-03-07T23:29:59.514ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ebe965cf-7fca-4bad-860f-d0bdcdff7c5c", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20632025-03-07T23:29:59.515ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
20642025-03-07T23:29:59.515ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20652025-03-07T23:29:59.533ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20662025-03-07T23:29:59.534ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20672025-03-07T23:29:59.534ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20682025-03-07T23:29:59.534ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20692025-03-07T23:29:59.543ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20702025-03-07T23:29:59.543ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20712025-03-07T23:29:59.550ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20722025-03-07T23:29:59.552ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "29ea8f76-242f-45f6-8ced-f450d61f858e", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20732025-03-07T23:29:59.552ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
20742025-03-07T23:29:59.553ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20752025-03-07T23:29:59.553ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20762025-03-07T23:29:59.554ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20772025-03-07T23:29:59.567ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e8823d5-ac8a-4fa2-a8b2-4512e97e451a", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20782025-03-07T23:29:59.567ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
20792025-03-07T23:29:59.568ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20802025-03-07T23:29:59.568ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20812025-03-07T23:29:59.569ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20822025-03-07T23:29:59.571ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20832025-03-07T23:29:59.571ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20842025-03-07T23:29:59.572ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20852025-03-07T23:29:59.572ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20862025-03-07T23:29:59.572ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20872025-03-07T23:29:59.573ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "391a3e02-e522-49e8-a353-020a10bb4f34", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20882025-03-07T23:29:59.573ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
20892025-03-07T23:29:59.575ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20902025-03-07T23:29:59.575ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20912025-03-07T23:29:59.575ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20922025-03-07T23:29:59.576ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20932025-03-07T23:29:59.578ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "74d7bab7-656d-4be2-9410-a2c69d61245e", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
20942025-03-07T23:29:59.578ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
20952025-03-07T23:29:59.579ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20962025-03-07T23:29:59.579ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20972025-03-07T23:29:59.579ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20982025-03-07T23:29:59.580ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20992025-03-07T23:29:59.587ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21002025-03-07T23:29:59.608ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21012025-03-07T23:29:59.608ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
21022025-03-07T23:29:59.608ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21032025-03-07T23:29:59.608ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21042025-03-07T23:29:59.609ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21052025-03-07T23:29:59.610ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "09aae816-c0d1-465c-98e0-f8705fc8f2d4", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21062025-03-07T23:29:59.611ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
21072025-03-07T23:29:59.611ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21082025-03-07T23:29:59.611ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21092025-03-07T23:29:59.611ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21102025-03-07T23:29:59.613ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c556f21f-edc8-4b3b-8983-91c599529f7e", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21112025-03-07T23:29:59.613ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
21122025-03-07T23:29:59.613ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21132025-03-07T23:29:59.614ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21142025-03-07T23:29:59.614ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21152025-03-07T23:29:59.616ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5952d634-6dc2-4327-b643-0bea50aa449e", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21162025-03-07T23:29:59.616ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
21172025-03-07T23:29:59.616ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21182025-03-07T23:29:59.616ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21192025-03-07T23:29:59.617ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21202025-03-07T23:29:59.618ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a02d80e3-cba5-413a-a895-461da947e531", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21212025-03-07T23:29:59.618ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
21222025-03-07T23:29:59.620ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21232025-03-07T23:29:59.620ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21242025-03-07T23:29:59.620ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21252025-03-07T23:29:59.620ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21262025-03-07T23:29:59.620ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21272025-03-07T23:29:59.626ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f450f155-a116-4630-b6e0-154543565fac", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21282025-03-07T23:29:59.627ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
21292025-03-07T23:29:59.627ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21302025-03-07T23:29:59.627ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21312025-03-07T23:29:59.627ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21322025-03-07T23:29:59.628ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21332025-03-07T23:29:59.632ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "94f2cdf5-b247-433e-823b-57974b9a5ad2", "content-length": "734", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21342025-03-07T23:29:59.633ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
21352025-03-07T23:29:59.633ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21362025-03-07T23:29:59.633ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21372025-03-07T23:29:59.633ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21382025-03-07T23:29:59.634ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21392025-03-07T23:29:59.636ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21402025-03-07T23:29:59.648ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
21412025-03-07T23:29:59.651ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
21422025-03-07T23:29:59.651ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21432025-03-07T23:29:59.651ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21442025-03-07T23:29:59.652ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21452025-03-07T23:29:59.652ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21462025-03-07T23:29:59.652ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21472025-03-07T23:29:59.654ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b0cfbc7a-ce47-498e-acb0-bc682ee32d3e", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21482025-03-07T23:29:59.655ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
21492025-03-07T23:29:59.658ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4c4eb543-aafa-4848-b1c8-01edf40fb82d", "content-length": "111", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21502025-03-07T23:29:59.658ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
21512025-03-07T23:29:59.662ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "76d40001-5c6d-47c9-a0b8-73a78d3a0d47", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21522025-03-07T23:29:59.662ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
21532025-03-07T23:29:59.665ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a5ce4a18-35e7-49fe-a594-1f7c314f24f1", "content-length": "167", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21542025-03-07T23:29:59.665ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
21552025-03-07T23:29:59.668ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9ecd9b0b-4160-4606-8185-625858d4ca43", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21562025-03-07T23:29:59.668ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
21572025-03-07T23:29:59.671ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b49fb41b-a2e1-46ac-8cd0-3b86049fcdcb", "content-length": "175", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21582025-03-07T23:29:59.671ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
21592025-03-07T23:29:59.673ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b6033e9c-f3a5-47bc-aaf7-3eb5b4946598", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21602025-03-07T23:29:59.673ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
21612025-03-07T23:29:59.674ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0488c7e1-1f84-4458-83b7-5933591f9d33", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21622025-03-07T23:29:59.674ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
21632025-03-07T23:29:59.676ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6a14e325-92b4-4b87-bcb7-7f31fecc275b", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21642025-03-07T23:29:59.676ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
21652025-03-07T23:29:59.677ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "728fed8a-6167-443a-8355-8a6988781026", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21662025-03-07T23:29:59.677ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
21672025-03-07T23:29:59.679ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "34d30f5b-20c1-46a1-925e-f3689ceb2839", "content-length": "723", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21682025-03-07T23:29:59.679ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
21692025-03-07T23:29:59.683ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9b8dbe2e-571f-4ee2-8d42-bb3c6016a92c", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21702025-03-07T23:29:59.683ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
21712025-03-07T23:29:59.686ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21722025-03-07T23:29:59.686ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21732025-03-07T23:29:59.686ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21742025-03-07T23:29:59.688ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21752025-03-07T23:29:59.689ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "43167580-69ee-4f48-97f1-f83bff4c785e", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:58 GMT"} })
21762025-03-07T23:29:59.689ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
21772025-03-07T23:29:59.689ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21782025-03-07T23:29:59.689ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21792025-03-07T23:29:59.689ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21802025-03-07T23:29:59.690ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21812025-03-07T23:29:59.729ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21822025-03-07T23:29:59.740ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
21832025-03-07T23:29:59.740ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21842025-03-07T23:29:59.740ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21852025-03-07T23:29:59.741ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21862025-03-07T23:29:59.759ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21872025-03-07T23:29:59.759ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21882025-03-07T23:29:59.759ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21892025-03-07T23:29:59.762ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21902025-03-07T23:29:59.762ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21912025-03-07T23:29:59.763ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21922025-03-07T23:29:59.768ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21932025-03-07T23:29:59.768ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21942025-03-07T23:29:59.768ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21952025-03-07T23:29:59.773ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21962025-03-07T23:29:59.773ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21972025-03-07T23:29:59.774ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21982025-03-07T23:29:59.776ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e2e3a01a-b0bf-432e-94a1-f269f827a8ba", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
21992025-03-07T23:29:59.777ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
22002025-03-07T23:29:59.787ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22012025-03-07T23:29:59.788ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22022025-03-07T23:29:59.788ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22032025-03-07T23:29:59.788ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22042025-03-07T23:29:59.789ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22052025-03-07T23:29:59.791ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22062025-03-07T23:29:59.791ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22072025-03-07T23:29:59.791ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22082025-03-07T23:29:59.792ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22092025-03-07T23:29:59.800ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e2ad0be6-d6d6-48b9-9ba1-3282a4bf1192", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22102025-03-07T23:29:59.800ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
22112025-03-07T23:29:59.802ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "32ff0f3a-cd4b-4e0d-8058-f9cb0897556a", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22122025-03-07T23:29:59.802ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
22132025-03-07T23:29:59.809ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22142025-03-07T23:29:59.809ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22152025-03-07T23:29:59.809ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22162025-03-07T23:29:59.810ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22172025-03-07T23:29:59.818ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "22c82137-798a-4aee-a9a2-3e8c82908e51", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22182025-03-07T23:29:59.825ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
22192025-03-07T23:29:59.826ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22202025-03-07T23:29:59.837ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22212025-03-07T23:29:59.838ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22222025-03-07T23:29:59.839ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22232025-03-07T23:29:59.840ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22242025-03-07T23:29:59.840ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22252025-03-07T23:29:59.841ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22262025-03-07T23:29:59.841ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22272025-03-07T23:29:59.849ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d7f824c4-2434-4924-a33d-755216dca9f6", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22282025-03-07T23:29:59.849ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
22292025-03-07T23:29:59.849ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22302025-03-07T23:29:59.849ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22312025-03-07T23:29:59.849ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22322025-03-07T23:29:59.850ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22332025-03-07T23:29:59.851ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2e3e4bfb-6751-45af-a3ed-e009ea895108", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22342025-03-07T23:29:59.851ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
22352025-03-07T23:29:59.852ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22362025-03-07T23:29:59.852ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22372025-03-07T23:29:59.852ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22382025-03-07T23:29:59.853ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22392025-03-07T23:29:59.854ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "be97074e-2231-47d1-ad6b-25fd01be5f68", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22402025-03-07T23:29:59.854ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
22412025-03-07T23:29:59.856ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a265fe72-3865-4e78-bf3f-51cd91d2718c", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22422025-03-07T23:29:59.856ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
22432025-03-07T23:29:59.856ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22442025-03-07T23:29:59.867ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22452025-03-07T23:29:59.867ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22462025-03-07T23:29:59.867ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22472025-03-07T23:29:59.867ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22482025-03-07T23:29:59.874ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6ff23670-fc82-4a15-88e8-b9c7530f7d40", "content-length": "723", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22492025-03-07T23:29:59.875ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
22502025-03-07T23:29:59.877ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "66d6a8ea-7d70-492e-91ca-7d561e8fbdea", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22512025-03-07T23:29:59.877ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
22522025-03-07T23:29:59.880ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7f4e3648-7a1b-4ca8-ad98-de5d2b341cbe", "content-length": "109", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22532025-03-07T23:29:59.880ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
22542025-03-07T23:29:59.881ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cdb3db46-c072-465a-a07b-f755bbef58fa", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22552025-03-07T23:29:59.901ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
22562025-03-07T23:29:59.905ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f5a5864d-49fc-46fa-ae91-3d3fc192af16", "content-length": "169", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22572025-03-07T23:29:59.910ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
22582025-03-07T23:29:59.910ZDEBGtest_unauthorized (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("nexus"): [NetworkInterface { id: b978e34c-a236-4eeb-8f4f-94355eab47b8, kind: Service { id: 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af }, name: Name("nexus-2d8d1c15-8782-4d4a-a8ba-3818fa1c29af"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("external-dns"): [NetworkInterface { id: 55f7daeb-467c-43a6-8ca8-6af4cf01d42e, kind: Service { id: 2020e185-cc36-4881-9ae7-262f444268e3 }, name: Name("external-dns-2020e185-cc36-4881-9ae7-262f444268e3"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
22592025-03-07T23:29:59.910ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
22602025-03-07T23:29:59.910ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22612025-03-07T23:29:59.910ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22622025-03-07T23:29:59.910ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22632025-03-07T23:29:59.911ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22642025-03-07T23:29:59.913ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fe863210-d603-4d05-b0e6-68614b680668", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22652025-03-07T23:29:59.913ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
22662025-03-07T23:29:59.913ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22672025-03-07T23:29:59.918ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
22682025-03-07T23:29:59.918ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22692025-03-07T23:29:59.918ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22702025-03-07T23:29:59.919ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22712025-03-07T23:29:59.924ZTRACtest_unauthorized (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-03-07T22:56:49.414306Z, time_modified: 2025-03-07T23:29:57.930477Z, allowed_ips: None }
22722025-03-07T23:29:59.924ZDEBGtest_unauthorized (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
22732025-03-07T23:29:59.925ZDEBGtest_unauthorized (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 55f7daeb-467c-43a6-8ca8-6af4cf01d42e, kind: Service { id: 2020e185-cc36-4881-9ae7-262f444268e3 }, name: Name("external-dns-2020e185-cc36-4881-9ae7-262f444268e3"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b978e34c-a236-4eeb-8f4f-94355eab47b8, kind: Service { id: 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af }, name: Name("nexus-2d8d1c15-8782-4d4a-a8ba-3818fa1c29af"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
22742025-03-07T23:29:59.925ZDEBGtest_unauthorized (InternalApi): resolved 2 rules for sleds
22752025-03-07T23:29:59.927ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "452e985b-3c4d-43fc-b6b9-327ab5095ea4", "content-length": "178", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22762025-03-07T23:29:59.927ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
22772025-03-07T23:29:59.928ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2ccebc02-e7d6-4643-b071-105535b288fd", "content-length": "702", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22782025-03-07T23:29:59.928ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
22792025-03-07T23:29:59.929ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "99df1f61-2388-4b9b-a241-ce5588fb09a0", "content-length": "727", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22802025-03-07T23:29:59.929ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
22812025-03-07T23:29:59.930ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1a96ceed-3745-4776-9e51-2dbe033af3fd", "content-length": "729", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22822025-03-07T23:29:59.930ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
22832025-03-07T23:29:59.932ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "26fd0901-0ef7-4f18-a880-39ed585a01f9", "content-length": "728", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
22842025-03-07T23:29:59.932ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
22852025-03-07T23:29:59.932ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22862025-03-07T23:29:59.932ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
22872025-03-07T23:29:59.932ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
22882025-03-07T23:29:59.932ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
22892025-03-07T23:29:59.934ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22902025-03-07T23:29:59.939ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
22912025-03-07T23:29:59.952ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
22922025-03-07T23:29:59.952ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22932025-03-07T23:29:59.952ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
22942025-03-07T23:29:59.952ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
22952025-03-07T23:29:59.956ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
22962025-03-07T23:29:59.958ZDEBGtest_unauthorized (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-07T23:29:53.229291Z, time_modified: 2025-03-07T23:29:53.229291Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(57532), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(58969) }]
22972025-03-07T23:29:59.958ZDEBGtest_unauthorized (InternalApi): sending firewall rules to sled agents
22982025-03-07T23:29:59.958ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22992025-03-07T23:29:59.958ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23002025-03-07T23:29:59.959ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23012025-03-07T23:29:59.959ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23022025-03-07T23:29:59.964ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
23032025-03-07T23:29:59.967ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
23042025-03-07T23:29:59.971ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23052025-03-07T23:29:59.972ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
23062025-03-07T23:29:59.979ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
23072025-03-07T23:29:59.979ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23082025-03-07T23:29:59.979ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23092025-03-07T23:29:59.979ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23102025-03-07T23:29:59.980ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23112025-03-07T23:30:00.201ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
23122025-03-07T23:30:00.201ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
23132025-03-07T23:30:00.202ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23142025-03-07T23:30:00.209ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
23152025-03-07T23:30:00.321ZDEBGtest_unauthorized (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:57532/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23162025-03-07T23:30:00.322ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:55506 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23172025-03-07T23:30:00.322ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:44909 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23182025-03-07T23:30:00.323ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:55506 req_id = 8a815ecc-8cec-464e-8ebf-cd8794dfb07a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
23192025-03-07T23:30:00.323ZINFOtest_unauthorized (dropshot): request completed latency_us = 561 local_addr = [::1]:57532 method = GET remote_addr = [::1]:55506 req_id = 8a815ecc-8cec-464e-8ebf-cd8794dfb07a response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
23202025-03-07T23:30:00.324ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "8a815ecc-8cec-464e-8ebf-cd8794dfb07a", "content-length": "2769", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
23212025-03-07T23:30:00.388ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
23222025-03-07T23:30:00.388ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
23232025-03-07T23:30:00.388ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
23242025-03-07T23:30:00.390ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
23252025-03-07T23:30:00.390ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23262025-03-07T23:30:00.390ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
23272025-03-07T23:30:00.390ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23282025-03-07T23:30:00.391ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
23292025-03-07T23:30:00.392ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:44909 req_id = 99d9960f-57fb-4a58-bbd6-51809cd105fc sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23302025-03-07T23:30:00.393ZINFOtest_unauthorized (dropshot): request completed latency_us = 1476 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:44909 req_id = 99d9960f-57fb-4a58-bbd6-51809cd105fc response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23312025-03-07T23:30:00.396ZDEBGtest_unauthorized (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:57532/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "99d9960f-57fb-4a58-bbd6-51809cd105fc", "date": "Fri, 07 Mar 2025 23:29:59 GMT"} })
23322025-03-07T23:30:00.400ZINFOtest_unauthorized (InternalApi): updated firewall rules on 1 sleds
23332025-03-07T23:30:00.400ZINFOtest_unauthorized (nexus): plumbed initial IP allowlist
23342025-03-07T23:30:00.475ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = / versions = all
23352025-03-07T23:30:00.475ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /access versions = all
23362025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /assets/{path} versions = all
23372025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /device/auth versions = all
23382025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /device/confirm versions = all
23392025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /device/success versions = all
23402025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /device/token versions = all
23412025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /device/verify versions = all
23422025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/probes versions = all
23432025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /experimental/v1/probes versions = all
23442025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /experimental/v1/probes/{probe} versions = all
23452025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/probes/{probe} versions = all
23462025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/system/support-bundles versions = all
23472025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /experimental/v1/system/support-bundles versions = all
23482025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
23492025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
23502025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
23512025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
23522025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
23532025-03-07T23:30:00.476ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
23542025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/index versions = all
23552025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /images versions = all
23562025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /login versions = all
23572025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /login/{silo_name}/local versions = all
23582025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
23592025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
23602025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
23612025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /lookup/{path} versions = all
23622025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /projects/{path} versions = all
23632025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /projects-new versions = all
23642025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /settings/{path} versions = all
23652025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /system/{path} versions = all
23662025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /utilization versions = all
23672025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/affinity-groups versions = all
23682025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/affinity-groups versions = all
23692025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
23702025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
23712025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
23722025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
23732025-03-07T23:30:00.500ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
23742025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
23752025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
23762025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/anti-affinity-groups versions = all
23772025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/anti-affinity-groups versions = all
23782025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
23792025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
23802025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
23812025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
23822025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
23832025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
23842025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
23852025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
23862025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
23872025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
23882025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/certificates versions = all
23892025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/certificates versions = all
23902025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/certificates/{certificate} versions = all
23912025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/certificates/{certificate} versions = all
23922025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/disks versions = all
23932025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/disks versions = all
23942025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/disks/{disk} versions = all
23952025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/disks/{disk} versions = all
23962025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/disks/{disk}/bulk-write versions = all
23972025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
23982025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
23992025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/disks/{disk}/finalize versions = all
24002025-03-07T23:30:00.501ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/disks/{disk}/metrics/{metric} versions = all
24012025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/floating-ips versions = all
24022025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/floating-ips versions = all
24032025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
24042025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/floating-ips/{floating_ip} versions = all
24052025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
24062025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
24072025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
24082025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/groups versions = all
24092025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/groups/{group_id} versions = all
24102025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/images versions = all
24112025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/images versions = all
24122025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/images/{image} versions = all
24132025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/images/{image} versions = all
24142025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/images/{image}/demote versions = all
24152025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/images/{image}/promote versions = all
24162025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances versions = all
24172025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances versions = all
24182025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/instances/{instance} versions = all
24192025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances/{instance} versions = all
24202025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/instances/{instance} versions = all
24212025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances/{instance}/disks versions = all
24222025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances/{instance}/disks/attach versions = all
24232025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances/{instance}/disks/detach versions = all
24242025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances/{instance}/external-ips versions = all
24252025-03-07T23:30:00.502ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
24262025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
24272025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances/{instance}/reboot versions = all
24282025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances/{instance}/serial-console versions = all
24292025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
24302025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
24312025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances/{instance}/start versions = all
24322025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/instances/{instance}/stop versions = all
24332025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/internet-gateway-ip-addresses versions = all
24342025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/internet-gateway-ip-addresses versions = all
24352025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
24362025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/internet-gateway-ip-pools versions = all
24372025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/internet-gateway-ip-pools versions = all
24382025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
24392025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/internet-gateways versions = all
24402025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/internet-gateways versions = all
24412025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
24422025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/internet-gateways/{gateway} versions = all
24432025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/ip-pools versions = all
24442025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/ip-pools/{pool} versions = all
24452025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/login/{silo_name}/local versions = all
24462025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/logout versions = all
24472025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/me versions = all
24482025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/me/groups versions = all
24492025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/me/ssh-keys versions = all
24502025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/me/ssh-keys versions = all
24512025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
24522025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
24532025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/metrics/{metric_name} versions = all
24542025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/network-interfaces versions = all
24552025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/network-interfaces versions = all
24562025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/network-interfaces/{interface} versions = all
24572025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/network-interfaces/{interface} versions = all
24582025-03-07T23:30:00.503ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/network-interfaces/{interface} versions = all
24592025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/ping versions = all
24602025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/policy versions = all
24612025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/policy versions = all
24622025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/projects versions = all
24632025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/projects versions = all
24642025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/projects/{project} versions = all
24652025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/projects/{project} versions = all
24662025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/projects/{project} versions = all
24672025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/projects/{project}/policy versions = all
24682025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/projects/{project}/policy versions = all
24692025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/snapshots versions = all
24702025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/snapshots versions = all
24712025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/snapshots/{snapshot} versions = all
24722025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/snapshots/{snapshot} versions = all
24732025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/disks versions = all
24742025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
24752025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
24762025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/racks versions = all
24772025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
24782025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/sleds versions = all
24792025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/hardware/sleds versions = all
24802025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
24812025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
24822025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
24832025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
24842025-03-07T23:30:00.504ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
24852025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/switch-port versions = all
24862025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
24872025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
24882025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
24892025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
24902025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
24912025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/switches versions = all
24922025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
24932025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/identity-providers versions = all
24942025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/identity-providers/local/users versions = all
24952025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
24962025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
24972025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/identity-providers/saml versions = all
24982025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
24992025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools versions = all
25002025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/ip-pools versions = all
25012025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
25022025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools/{pool} versions = all
25032025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/ip-pools/{pool} versions = all
25042025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
25052025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
25062025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
25072025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
25082025-03-07T23:30:00.505ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
25092025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
25102025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
25112025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
25122025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools-service versions = all
25132025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/ip-pools-service/ranges versions = all
25142025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
25152025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
25162025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/metrics/{metric_name} versions = all
25172025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/address-lot versions = all
25182025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/networking/address-lot versions = all
25192025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
25202025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
25212025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/allow-list versions = all
25222025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/networking/allow-list versions = all
25232025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/networking/bfd-disable versions = all
25242025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/networking/bfd-enable versions = all
25252025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bfd-status versions = all
25262025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/networking/bgp versions = all
25272025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp versions = all
25282025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/networking/bgp versions = all
25292025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp-announce-set versions = all
25302025-03-07T23:30:00.506ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
25312025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
25322025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
25332025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp-exported versions = all
25342025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp-message-history versions = all
25352025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
25362025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/bgp-status versions = all
25372025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/loopback-address versions = all
25382025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/networking/loopback-address versions = all
25392025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
25402025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
25412025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/switch-port-settings versions = all
25422025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/networking/switch-port-settings versions = all
25432025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
25442025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/policy versions = all
25452025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/policy versions = all
25462025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/roles versions = all
25472025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/roles/{role_name} versions = all
25482025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/silo-quotas versions = all
25492025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/silos versions = all
25502025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/silos versions = all
25512025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/system/silos/{silo} versions = all
25522025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/silos/{silo} versions = all
25532025-03-07T23:30:00.507ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
25542025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/silos/{silo}/policy versions = all
25552025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/silos/{silo}/policy versions = all
25562025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/silos/{silo}/quotas versions = all
25572025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
25582025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/system/timeseries/query versions = all
25592025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/timeseries/schemas versions = all
25602025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/update/repository versions = all
25612025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/update/repository/{system_version} versions = all
25622025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/update/target-release versions = all
25632025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/system/update/target-release versions = all
25642025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/users versions = all
25652025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/users/{user_id} versions = all
25662025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/users-builtin versions = all
25672025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/users-builtin/{user} versions = all
25682025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/utilization/silos versions = all
25692025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/system/utilization/silos/{silo} versions = all
25702025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/timeseries/query versions = all
25712025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/users versions = all
25722025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/utilization versions = all
25732025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-firewall-rules versions = all
25742025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/vpc-firewall-rules versions = all
25752025-03-07T23:30:00.508ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-router-routes versions = all
25762025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/vpc-router-routes versions = all
25772025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
25782025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-router-routes/{route} versions = all
25792025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/vpc-router-routes/{route} versions = all
25802025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-routers versions = all
25812025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/vpc-routers versions = all
25822025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/vpc-routers/{router} versions = all
25832025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-routers/{router} versions = all
25842025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/vpc-routers/{router} versions = all
25852025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-subnets versions = all
25862025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/vpc-subnets versions = all
25872025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
25882025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-subnets/{subnet} versions = all
25892025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
25902025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
25912025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpcs versions = all
25922025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = POST path = /v1/vpcs versions = all
25932025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = DELETE path = /v1/vpcs/{vpc} versions = all
25942025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = GET path = /v1/vpcs/{vpc} versions = all
25952025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:48685 method = PUT path = /v1/vpcs/{vpc} versions = all
25962025-03-07T23:30:00.509ZINFOtest_unauthorized (dropshot_external): listening local_addr = 127.0.0.1:48685
25972025-03-07T23:30:00.509ZDEBGtest_unauthorized (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:48685
25982025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = / versions = all
25992025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /access versions = all
26002025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /assets/{path} versions = all
26012025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /device/auth versions = all
26022025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /device/confirm versions = all
26032025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /device/success versions = all
26042025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /device/token versions = all
26052025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /device/verify versions = all
26062025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/probes versions = all
26072025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /experimental/v1/probes versions = all
26082025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /experimental/v1/probes/{probe} versions = all
26092025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/probes/{probe} versions = all
26102025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/system/support-bundles versions = all
26112025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /experimental/v1/system/support-bundles versions = all
26122025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
26132025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
26142025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
26152025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
26162025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
26172025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
26182025-03-07T23:30:00.561ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/index versions = all
26192025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /images versions = all
26202025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /login versions = all
26212025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /login/{silo_name}/local versions = all
26222025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
26232025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
26242025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
26252025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /lookup/{path} versions = all
26262025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /projects/{path} versions = all
26272025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /projects-new versions = all
26282025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /settings/{path} versions = all
26292025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /system/{path} versions = all
26302025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /utilization versions = all
26312025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/affinity-groups versions = all
26322025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/affinity-groups versions = all
26332025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
26342025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
26352025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
26362025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
26372025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26382025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26392025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
26402025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/anti-affinity-groups versions = all
26412025-03-07T23:30:00.562ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/anti-affinity-groups versions = all
26422025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
26432025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
26442025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
26452025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
26462025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
26472025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
26482025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/affinity-group/{affinity_group} versions = all
26492025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
26502025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
26512025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
26522025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/certificates versions = all
26532025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/certificates versions = all
26542025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/certificates/{certificate} versions = all
26552025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/certificates/{certificate} versions = all
26562025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/disks versions = all
26572025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/disks versions = all
26582025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/disks/{disk} versions = all
26592025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/disks/{disk} versions = all
26602025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/disks/{disk}/bulk-write versions = all
26612025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
26622025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
26632025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/disks/{disk}/finalize versions = all
26642025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/disks/{disk}/metrics/{metric} versions = all
26652025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/floating-ips versions = all
26662025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/floating-ips versions = all
26672025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
26682025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/floating-ips/{floating_ip} versions = all
26692025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
26702025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
26712025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
26722025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/groups versions = all
26732025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/groups/{group_id} versions = all
26742025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/images versions = all
26752025-03-07T23:30:00.563ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/images versions = all
26762025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/images/{image} versions = all
26772025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/images/{image} versions = all
26782025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/images/{image}/demote versions = all
26792025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/images/{image}/promote versions = all
26802025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances versions = all
26812025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances versions = all
26822025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/instances/{instance} versions = all
26832025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances/{instance} versions = all
26842025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/instances/{instance} versions = all
26852025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances/{instance}/disks versions = all
26862025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances/{instance}/disks/attach versions = all
26872025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances/{instance}/disks/detach versions = all
26882025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances/{instance}/external-ips versions = all
26892025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
26902025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
26912025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances/{instance}/reboot versions = all
26922025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances/{instance}/serial-console versions = all
26932025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
26942025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
26952025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances/{instance}/start versions = all
26962025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/instances/{instance}/stop versions = all
26972025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/internet-gateway-ip-addresses versions = all
26982025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/internet-gateway-ip-addresses versions = all
26992025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
27002025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/internet-gateway-ip-pools versions = all
27012025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/internet-gateway-ip-pools versions = all
27022025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
27032025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/internet-gateways versions = all
27042025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/internet-gateways versions = all
27052025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
27062025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/internet-gateways/{gateway} versions = all
27072025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/ip-pools versions = all
27082025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/ip-pools/{pool} versions = all
27092025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/login/{silo_name}/local versions = all
27102025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/logout versions = all
27112025-03-07T23:30:00.564ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/me versions = all
27122025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/me/groups versions = all
27132025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/me/ssh-keys versions = all
27142025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/me/ssh-keys versions = all
27152025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
27162025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
27172025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/metrics/{metric_name} versions = all
27182025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/network-interfaces versions = all
27192025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/network-interfaces versions = all
27202025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/network-interfaces/{interface} versions = all
27212025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/network-interfaces/{interface} versions = all
27222025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/network-interfaces/{interface} versions = all
27232025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/ping versions = all
27242025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/policy versions = all
27252025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/policy versions = all
27262025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/projects versions = all
27272025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/projects versions = all
27282025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/projects/{project} versions = all
27292025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/projects/{project} versions = all
27302025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/projects/{project} versions = all
27312025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/projects/{project}/policy versions = all
27322025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/projects/{project}/policy versions = all
27332025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/snapshots versions = all
27342025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/snapshots versions = all
27352025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/snapshots/{snapshot} versions = all
27362025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/snapshots/{snapshot} versions = all
27372025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/disks versions = all
27382025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
27392025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
27402025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/racks versions = all
27412025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
27422025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/sleds versions = all
27432025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/hardware/sleds versions = all
27442025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
27452025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
27462025-03-07T23:30:00.565ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
27472025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
27482025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
27492025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/switch-port versions = all
27502025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
27512025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
27522025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
27532025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
27542025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
27552025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/switches versions = all
27562025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
27572025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/identity-providers versions = all
27582025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/identity-providers/local/users versions = all
27592025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
27602025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
27612025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/identity-providers/saml versions = all
27622025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
27632025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools versions = all
27642025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/ip-pools versions = all
27652025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
27662025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools/{pool} versions = all
27672025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/ip-pools/{pool} versions = all
27682025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
27692025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
27702025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
27712025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
27722025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
27732025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
27742025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
27752025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
27762025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools-service versions = all
27772025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/ip-pools-service/ranges versions = all
27782025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
27792025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
27802025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/metrics/{metric_name} versions = all
27812025-03-07T23:30:00.566ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/address-lot versions = all
27822025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/networking/address-lot versions = all
27832025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
27842025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
27852025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/allow-list versions = all
27862025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/networking/allow-list versions = all
27872025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/networking/bfd-disable versions = all
27882025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/networking/bfd-enable versions = all
27892025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bfd-status versions = all
27902025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/networking/bgp versions = all
27912025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp versions = all
27922025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/networking/bgp versions = all
27932025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp-announce-set versions = all
27942025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
27952025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
27962025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
27972025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp-exported versions = all
27982025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp-message-history versions = all
27992025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
28002025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/bgp-status versions = all
28012025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/loopback-address versions = all
28022025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/networking/loopback-address versions = all
28032025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
28042025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
28052025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/switch-port-settings versions = all
28062025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/networking/switch-port-settings versions = all
28072025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
28082025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/policy versions = all
28092025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/policy versions = all
28102025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/roles versions = all
28112025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/roles/{role_name} versions = all
28122025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/silo-quotas versions = all
28132025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/silos versions = all
28142025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/silos versions = all
28152025-03-07T23:30:00.567ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/system/silos/{silo} versions = all
28162025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/silos/{silo} versions = all
28172025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
28182025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/silos/{silo}/policy versions = all
28192025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/silos/{silo}/policy versions = all
28202025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/silos/{silo}/quotas versions = all
28212025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
28222025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/system/timeseries/query versions = all
28232025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/timeseries/schemas versions = all
28242025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/update/repository versions = all
28252025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/update/repository/{system_version} versions = all
28262025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/update/target-release versions = all
28272025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/system/update/target-release versions = all
28282025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/users versions = all
28292025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/users/{user_id} versions = all
28302025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/users-builtin versions = all
28312025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/users-builtin/{user} versions = all
28322025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/utilization/silos versions = all
28332025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/system/utilization/silos/{silo} versions = all
28342025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/timeseries/query versions = all
28352025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/users versions = all
28362025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/utilization versions = all
28372025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-firewall-rules versions = all
28382025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/vpc-firewall-rules versions = all
28392025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-router-routes versions = all
28402025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/vpc-router-routes versions = all
28412025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
28422025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-router-routes/{route} versions = all
28432025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/vpc-router-routes/{route} versions = all
28442025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-routers versions = all
28452025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/vpc-routers versions = all
28462025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/vpc-routers/{router} versions = all
28472025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-routers/{router} versions = all
28482025-03-07T23:30:00.568ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/vpc-routers/{router} versions = all
28492025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-subnets versions = all
28502025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/vpc-subnets versions = all
28512025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
28522025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-subnets/{subnet} versions = all
28532025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
28542025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
28552025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpcs versions = all
28562025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = POST path = /v1/vpcs versions = all
28572025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = DELETE path = /v1/vpcs/{vpc} versions = all
28582025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = GET path = /v1/vpcs/{vpc} versions = all
28592025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56007 method = PUT path = /v1/vpcs/{vpc} versions = all
28602025-03-07T23:30:00.569ZINFOtest_unauthorized (dropshot_external_techport): listening local_addr = 127.0.0.1:56007
28612025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:56007
28622025-03-07T23:30:00.569ZDEBGtest_unauthorized (nexus-producer-server): registered DTrace probes
28632025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = 127.0.0.1:52350 method = GET path = /{producer_id} versions = all
28642025-03-07T23:30:00.569ZINFOtest_unauthorized (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:328 local_addr = 127.0.0.1:52350
28652025-03-07T23:30:00.569ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:52350
28662025-03-07T23:30:00.569ZDEBGtest_unauthorized (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:52350
28672025-03-07T23:30:00.569ZDEBGtest_unauthorized (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:34193
28682025-03-07T23:30:00.569ZDEBGtest_unauthorized (nexus-producer-server): starting producer registration task
28692025-03-07T23:30:00.569ZINFOtest_unauthorized (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:52350 file = oximeter/producer/src/lib.rs:279 interval = 10s producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
28702025-03-07T23:30:00.569ZDEBGtest_unauthorized (init_with_steps): Running step start_oximeter
28712025-03-07T23:30:00.569ZDEBGtest_unauthorized: Starting Oximeter
28722025-03-07T23:30:00.570ZDEBGtest_unauthorized (oximeter): registered DTrace probes
28732025-03-07T23:30:00.570ZINFOtest_unauthorized (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:236
28742025-03-07T23:30:00.570ZDEBGtest_unauthorized (oximeter): creating ClickHouse client
28752025-03-07T23:30:00.572ZDEBGtest_unauthorized (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
28762025-03-07T23:30:00.572ZDEBGtest_unauthorized (producer-registration-task): registering / renewing oximeter producer lease with Nexus
28772025-03-07T23:30:00.572ZDEBGtest_unauthorized (producer-registration-task): using nexus address for registration addr = 127.0.0.1:34193
28782025-03-07T23:30:00.694ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:34193/metrics/producers
28792025-03-07T23:30:00.696ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28802025-03-07T23:30:00.704ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
28812025-03-07T23:30:00.704ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
28822025-03-07T23:30:00.704ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28832025-03-07T23:30:00.705ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
28842025-03-07T23:30:00.706ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:62219
28852025-03-07T23:30:00.708ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:62219 req_id = 276f4b52-5b71-4b9a-a4f6-66ca293408fa uri = /metrics/producers
28862025-03-07T23:30:00.710ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:62219 req_id = 276f4b52-5b71-4b9a-a4f6-66ca293408fa resource = Database uri = /metrics/producers
28872025-03-07T23:30:00.710ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:62219 req_id = 276f4b52-5b71-4b9a-a4f6-66ca293408fa roles = RoleSet { roles: {} } uri = /metrics/producers
28882025-03-07T23:30:00.711ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:62219 req_id = 276f4b52-5b71-4b9a-a4f6-66ca293408fa resource = Database result = Ok(()) uri = /metrics/producers
28892025-03-07T23:30:00.713ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
28902025-03-07T23:30:00.729ZWARNtest_unauthorized (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:894 id = 7fd32c60-af82-427f-b4b1-24210d636c72
28912025-03-07T23:30:00.729ZDEBGtest_unauthorized (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
28922025-03-07T23:30:00.729ZINFOtest_unauthorized (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:794 id = 7fd32c60-af82-427f-b4b1-24210d636c72
28932025-03-07T23:30:00.730ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
28942025-03-07T23:30:00.732ZWARNtest_unauthorized (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:894 id = 7fd32c60-af82-427f-b4b1-24210d636c72
28952025-03-07T23:30:00.733ZINFOtest_unauthorized (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:799 id = 7fd32c60-af82-427f-b4b1-24210d636c72 version = 0
28962025-03-07T23:30:00.733ZINFOtest_unauthorized (clickhouse-client): initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:804 id = 7fd32c60-af82-427f-b4b1-24210d636c72
28972025-03-07T23:30:00.733ZDEBGtest_unauthorized (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
28982025-03-07T23:30:00.733ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = CREATE DATABASE IF NOT EXISTS oximeter
28992025-03-07T23:30:00.734ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
29002025-03-07T23:30:00.782ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 73606 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:62219 req_id = 276f4b52-5b71-4b9a-a4f6-66ca293408fa response_code = 503 uri = /metrics/producers
29012025-03-07T23:30:00.782ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29022025-03-07T23:30:00.784ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "276f4b52-5b71-4b9a-a4f6-66ca293408fa", "content-length": "133", "date": "Fri, 07 Mar 2025 23:30:00 GMT"} })
29032025-03-07T23:30:00.789ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 277.473302ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"276f4b52-5b71-4b9a-a4f6-66ca293408fa\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Fri, 07 Mar 2025 23:30:00 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"276f4b52-5b71-4b9a-a4f6-66ca293408fa\\" }" file = oximeter/producer/src/lib.rs:420
29042025-03-07T23:30:00.789ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29052025-03-07T23:30:00.797ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29062025-03-07T23:30:00.803ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29072025-03-07T23:30:00.811ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29082025-03-07T23:30:00.817ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29092025-03-07T23:30:00.822ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29102025-03-07T23:30:00.825ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29112025-03-07T23:30:00.833ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29122025-03-07T23:30:00.844ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29132025-03-07T23:30:00.849ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29142025-03-07T23:30:00.866ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29152025-03-07T23:30:00.871ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29162025-03-07T23:30:00.877ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29172025-03-07T23:30:00.877ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: ca ed 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:56526 req_id = 5cf03103-c178-41e7-a61c-80be2d769ad4
29182025-03-07T23:30:00.878ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 51949,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56526 req_id = 5cf03103-c178-41e7-a61c-80be2d769ad4
29192025-03-07T23:30:00.878ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
29202025-03-07T23:30:00.879ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
29212025-03-07T23:30:00.879ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:56526 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal") })) }] req_id = 5cf03103-c178-41e7-a61c-80be2d769ad4
29222025-03-07T23:30:00.880ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: d8 75 01 00 00 01 00 00 00 00 00 01 24 39 37 30 .u..........$970\n0010: 66 64 62 39 31 2d 63 35 30 65 2d 34 33 37 37 2d fdb91-c50e-4377-\n0020: 38 35 37 34 2d 33 36 66 61 65 37 62 33 65 34 65 8574-36fae7b3e4e\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:57607 req_id = 4958f0bd-10fa-4b92-94fc-adc799816655
29232025-03-07T23:30:00.881ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 55413,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 57,\n 55,\n 48,\n 102,\n 100,\n 98,\n 57,\n 49,\n 45,\n 99,\n 53,\n 48,\n 101,\n 45,\n 52,\n 51,\n 55,\n 55,\n 45,\n 56,\n 53,\n 55,\n 52,\n 45,\n 51,\n 54,\n 102,\n 97,\n 101,\n 55,\n 98,\n 51,\n 101,\n 52,\n 101,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57607 req_id = 4958f0bd-10fa-4b92-94fc-adc799816655
29242025-03-07T23:30:00.882ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
29252025-03-07T23:30:00.882ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:57607 query = LowerQuery { name: LowerName(Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.")), original: Query { name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 4958f0bd-10fa-4b92-94fc-adc799816655
29262025-03-07T23:30:00.882ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29272025-03-07T23:30:01.046ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29282025-03-07T23:30:01.049ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:56389 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29292025-03-07T23:30:01.051ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29302025-03-07T23:30:01.055ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = fddf01a4-0e09-459f-8b39-7933e4aeffda sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29312025-03-07T23:30:01.056ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 932 local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = fddf01a4-0e09-459f-8b39-7933e4aeffda response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29322025-03-07T23:30:01.056ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29332025-03-07T23:30:01.866ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29342025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:58100 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29352025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:56920 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29362025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:46403 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29372025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:44311 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29382025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:56069 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29392025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:54749 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29402025-03-07T23:30:01.866ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:59818 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29412025-03-07T23:30:01.937ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:34193/metrics/producers
29422025-03-07T23:30:01.939ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29432025-03-07T23:30:01.939ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:48681
29442025-03-07T23:30:01.939ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:58100 req_id = be93b1d4-8d45-4d86-a12b-e05385e884e4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29452025-03-07T23:30:01.940ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:56920 req_id = 816728df-d450-4e9a-be33-4ded11bc6e31 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29462025-03-07T23:30:01.940ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:46403 req_id = bebbc222-245e-4a1b-80cd-255f1b081fd8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29472025-03-07T23:30:01.940ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:44311 req_id = 1350eea1-343d-4e5e-84b0-a2832126f36f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29482025-03-07T23:30:01.940ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:56069 req_id = 0069cde6-f90f-4c76-ad58-ea3719985963 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29492025-03-07T23:30:01.940ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:54749 req_id = 89d78759-581b-4a57-9800-04d20e256f10 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29502025-03-07T23:30:01.940ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:59818 req_id = 870e002d-fdae-497d-a9f2-fb14d5242f1f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29512025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1072 local_addr = [::1]:37181 method = GET remote_addr = [::1]:58100 req_id = be93b1d4-8d45-4d86-a12b-e05385e884e4 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29522025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1003 local_addr = [::1]:37181 method = GET remote_addr = [::1]:56920 req_id = 816728df-d450-4e9a-be33-4ded11bc6e31 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29532025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 939 local_addr = [::1]:37181 method = GET remote_addr = [::1]:46403 req_id = bebbc222-245e-4a1b-80cd-255f1b081fd8 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29542025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 867 local_addr = [::1]:37181 method = GET remote_addr = [::1]:44311 req_id = 1350eea1-343d-4e5e-84b0-a2832126f36f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29552025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 980 local_addr = [::1]:37181 method = GET remote_addr = [::1]:56069 req_id = 0069cde6-f90f-4c76-ad58-ea3719985963 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29562025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 993 local_addr = [::1]:37181 method = GET remote_addr = [::1]:54749 req_id = 89d78759-581b-4a57-9800-04d20e256f10 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29572025-03-07T23:30:01.941ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 932 local_addr = [::1]:37181 method = GET remote_addr = [::1]:59818 req_id = 870e002d-fdae-497d-a9f2-fb14d5242f1f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
29582025-03-07T23:30:01.942ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48681 req_id = 87a86dd0-13a1-4456-ab82-a3838188d719 uri = /metrics/producers
29592025-03-07T23:30:01.943ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48681 req_id = 87a86dd0-13a1-4456-ab82-a3838188d719 resource = Database uri = /metrics/producers
29602025-03-07T23:30:01.944ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48681 req_id = 87a86dd0-13a1-4456-ab82-a3838188d719 roles = RoleSet { roles: {} } uri = /metrics/producers
29612025-03-07T23:30:01.945ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48681 req_id = 87a86dd0-13a1-4456-ab82-a3838188d719 resource = Database result = Ok(()) uri = /metrics/producers
29622025-03-07T23:30:01.946ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29632025-03-07T23:30:01.967ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 24633 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48681 req_id = 87a86dd0-13a1-4456-ab82-a3838188d719 response_code = 503 uri = /metrics/producers
29642025-03-07T23:30:01.967ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29652025-03-07T23:30:01.968ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "87a86dd0-13a1-4456-ab82-a3838188d719", "content-length": "133", "date": "Fri, 07 Mar 2025 23:30:01 GMT"} })
29662025-03-07T23:30:01.969ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 542.827688ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"87a86dd0-13a1-4456-ab82-a3838188d719\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Fri, 07 Mar 2025 23:30:01 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"87a86dd0-13a1-4456-ab82-a3838188d719\\" }" file = oximeter/producer/src/lib.rs:420
29672025-03-07T23:30:01.982ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29682025-03-07T23:30:01.988ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29692025-03-07T23:30:02.024ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29702025-03-07T23:30:02.030ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29712025-03-07T23:30:02.038ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29722025-03-07T23:30:02.062ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29732025-03-07T23:30:02.067ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29742025-03-07T23:30:02.072ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29752025-03-07T23:30:02.076ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29762025-03-07T23:30:02.081ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29772025-03-07T23:30:02.087ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29782025-03-07T23:30:02.103ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29792025-03-07T23:30:02.114ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29802025-03-07T23:30:02.117ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29812025-03-07T23:30:02.121ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29822025-03-07T23:30:02.124ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29832025-03-07T23:30:02.132ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29842025-03-07T23:30:02.136ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
29852025-03-07T23:30:02.143ZINFOtest_unauthorized (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:825 id = 7fd32c60-af82-427f-b4b1-24210d636c72 version = 14
29862025-03-07T23:30:02.143ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = INSERT INTO oximeter.version (*) VALUES (14, now());
29872025-03-07T23:30:02.148ZDEBGtest_unauthorized (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 91a9aaf5-ddd7-4916-967f-61b4a84db4e0
29882025-03-07T23:30:02.150ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:56373 method = GET path = /info versions = all
29892025-03-07T23:30:02.150ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:56373 method = GET path = /producers versions = all
29902025-03-07T23:30:02.150ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:56373 method = DELETE path = /producers/{producer_id} versions = all
29912025-03-07T23:30:02.150ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:56373 method = GET path = /producers/{producer_id} versions = all
29922025-03-07T23:30:02.150ZINFOtest_unauthorized (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:328 local_addr = [::1]:56373
29932025-03-07T23:30:02.154ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:56373
29942025-03-07T23:30:02.155ZDEBGtest_unauthorized (oximeter): registered USDT probes
29952025-03-07T23:30:02.155ZDEBGtest_unauthorized (oximeter): contacting nexus
29962025-03-07T23:30:03.256ZDEBGtest_unauthorized (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:34193/metrics/collectors
29972025-03-07T23:30:03.257ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
29982025-03-07T23:30:03.257ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
29992025-03-07T23:30:03.339ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:34193/metrics/producers
30002025-03-07T23:30:03.343ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:41077
30012025-03-07T23:30:03.344ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:34454
30022025-03-07T23:30:03.345ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:34454 req_id = bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8 uri = /metrics/producers
30032025-03-07T23:30:03.346ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:34454 req_id = bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8 resource = Database uri = /metrics/producers
30042025-03-07T23:30:03.346ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:34454 req_id = bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8 roles = RoleSet { roles: {} } uri = /metrics/producers
30052025-03-07T23:30:03.348ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:34454 req_id = bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8 resource = Database result = Ok(()) uri = /metrics/producers
30062025-03-07T23:30:03.349ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:41077 req_id = 8584e996-2acc-451b-8220-ea36c46d8538 uri = /metrics/collectors
30072025-03-07T23:30:03.349ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:41077 req_id = 8584e996-2acc-451b-8220-ea36c46d8538 resource = Database uri = /metrics/collectors
30082025-03-07T23:30:03.349ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:41077 req_id = 8584e996-2acc-451b-8220-ea36c46d8538 roles = RoleSet { roles: {} } uri = /metrics/collectors
30092025-03-07T23:30:03.350ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:41077 req_id = 8584e996-2acc-451b-8220-ea36c46d8538 resource = Database result = Ok(()) uri = /metrics/collectors
30102025-03-07T23:30:03.361ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 15826 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:34454 req_id = bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8 response_code = 503 uri = /metrics/producers
30112025-03-07T23:30:03.364ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8", "content-length": "133", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
30122025-03-07T23:30:03.371ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 1.378683881s error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Fri, 07 Mar 2025 23:30:03 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"bd75eac1-c6e5-498a-88ec-a80dc6dbd4b8\\" }" file = oximeter/producer/src/lib.rs:420
30132025-03-07T23:30:03.371ZINFOtest_unauthorized (nexus): registered new oximeter metric collection server address = [::1]:56373 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30142025-03-07T23:30:03.371ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 22348 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:41077 req_id = 8584e996-2acc-451b-8220-ea36c46d8538 response_code = 204 uri = /metrics/collectors
30152025-03-07T23:30:03.377ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors", status: 204, headers: {"x-request-id": "8584e996-2acc-451b-8220-ea36c46d8538", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
30162025-03-07T23:30:03.378ZINFOtest_unauthorized (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:392 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30172025-03-07T23:30:03.378ZDEBGtest_unauthorized (init_with_steps): Running step start_producer_server
30182025-03-07T23:30:03.378ZDEBGtest_unauthorized: Starting test metric Producer Server
30192025-03-07T23:30:03.401ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30202025-03-07T23:30:03.401ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30212025-03-07T23:30:03.401ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30222025-03-07T23:30:03.401ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30232025-03-07T23:30:03.402ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30242025-03-07T23:30:03.402ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30252025-03-07T23:30:03.402ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30262025-03-07T23:30:03.402ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30272025-03-07T23:30:03.402ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36988 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
30282025-03-07T23:30:03.402ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:36988 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30292025-03-07T23:30:03.403ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:36988 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30302025-03-07T23:30:03.403ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:36988 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30312025-03-07T23:30:03.403ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = 6ec5704f-f980-430a-a942-c7f6eceaa61a serial = totally-unique-serial: 6ec5704f-f980-430a-a942-c7f6eceaa61a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
30322025-03-07T23:30:03.403ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30332025-03-07T23:30:03.403ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30342025-03-07T23:30:03.404ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30352025-03-07T23:30:03.409ZINFOtest_unauthorized (oximeter-agent): starting refresh list task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:559
30362025-03-07T23:30:03.478ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:48386
30372025-03-07T23:30:03.479ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
30382025-03-07T23:30:03.482ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30392025-03-07T23:30:03.483ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5790ee23-2889-4106-8032-7e668dfd4f39 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30402025-03-07T23:30:03.484ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48386 req_id = 1cdc1b48-debe-4fac-91dd-cfadd0e15d7a uri = /metrics/producers
30412025-03-07T23:30:03.484ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5790ee23-2889-4106-8032-7e668dfd4f39 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30422025-03-07T23:30:03.484ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5790ee23-2889-4106-8032-7e668dfd4f39 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30432025-03-07T23:30:03.486ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5790ee23-2889-4106-8032-7e668dfd4f39 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30442025-03-07T23:30:03.500ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48386 req_id = 1cdc1b48-debe-4fac-91dd-cfadd0e15d7a resource = Database uri = /metrics/producers
30452025-03-07T23:30:03.500ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48386 req_id = 1cdc1b48-debe-4fac-91dd-cfadd0e15d7a roles = RoleSet { roles: {} } uri = /metrics/producers
30462025-03-07T23:30:03.500ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48386 req_id = 1cdc1b48-debe-4fac-91dd-cfadd0e15d7a resource = Database result = Ok(()) uri = /metrics/producers
30472025-03-07T23:30:03.504ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30482025-03-07T23:30:03.504ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30492025-03-07T23:30:03.505ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30502025-03-07T23:30:03.515ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = a6c0cac9-c7a2-4f07-9b0a-bbc68579b830
30512025-03-07T23:30:03.515ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = a6c0cac9-c7a2-4f07-9b0a-bbc68579b830 time_started = 2025-03-07 23:29:59.450510 UTC
30522025-03-07T23:30:03.515ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 4.80951627s iteration = 3 status = {"collection_id":"a6c0cac9-c7a2-4f07-9b0a-bbc68579b830","time_done":"2025-03-07 23:30:00.388351 UTC","time_started":"2025-03-07 23:29:59.450510 UTC"}
30532025-03-07T23:30:03.515ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 3 reason = Dependency
30542025-03-07T23:30:03.515ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
30552025-03-07T23:30:03.515ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 29.378\u{b5}s iteration = 3 status = {"error":"no blueprint"}
30562025-03-07T23:30:03.515ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 3 reason = Dependency
30572025-03-07T23:30:03.515ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 18.335\u{b5}s iteration = 3 status = {"error":"task disabled"}
30582025-03-07T23:30:03.516ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 32188 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5790ee23-2889-4106-8032-7e668dfd4f39 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30592025-03-07T23:30:03.516ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
30602025-03-07T23:30:03.516ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30612025-03-07T23:30:03.516ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30622025-03-07T23:30:03.516ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30632025-03-07T23:30:03.532ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30642025-03-07T23:30:03.532ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "5790ee23-2889-4106-8032-7e668dfd4f39", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
30652025-03-07T23:30:03.532ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 0 n_pruned_tasks = 0
30662025-03-07T23:30:03.561ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30672025-03-07T23:30:03.565ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
30682025-03-07T23:30:03.581ZINFOtest_unauthorized (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
30692025-03-07T23:30:03.581ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 97391 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:48386 req_id = 1cdc1b48-debe-4fac-91dd-cfadd0e15d7a response_code = 201 uri = /metrics/producers
30702025-03-07T23:30:03.684ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = 6ec5704f-f980-430a-a942-c7f6eceaa61a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 72fa80df-1134-4c26-8f56-47af05a6836f
30712025-03-07T23:30:03.684ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30722025-03-07T23:30:03.684ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30732025-03-07T23:30:03.684ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30742025-03-07T23:30:03.691ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
30752025-03-07T23:30:03.691ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30762025-03-07T23:30:03.691ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30772025-03-07T23:30:03.691ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30782025-03-07T23:30:03.699ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30792025-03-07T23:30:03.723ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30802025-03-07T23:30:03.727ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
30812025-03-07T23:30:03.742ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = 8997fdce-093d-4d30-a82e-270a30ca78a7 zpool_id = 72fa80df-1134-4c26-8f56-47af05a6836f
30822025-03-07T23:30:03.755ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
30832025-03-07T23:30:03.756ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30842025-03-07T23:30:03.756ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30852025-03-07T23:30:03.756ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30862025-03-07T23:30:03.757ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30872025-03-07T23:30:03.757ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 4 reason = Signaled
30882025-03-07T23:30:03.757ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
30892025-03-07T23:30:03.757ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30902025-03-07T23:30:03.758ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
30912025-03-07T23:30:03.758ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
30922025-03-07T23:30:03.759ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
30932025-03-07T23:30:03.768ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30942025-03-07T23:30:03.773ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
30952025-03-07T23:30:03.773ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
30962025-03-07T23:30:03.773ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
30972025-03-07T23:30:03.774ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
30982025-03-07T23:30:03.774ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30992025-03-07T23:30:03.782ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
31002025-03-07T23:30:03.782ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31012025-03-07T23:30:03.782ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
31022025-03-07T23:30:03.782ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31032025-03-07T23:30:03.787ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(5451549d-bcf7-4193-a1a6-8ba2254b9fb4, 0), (a6c0cac9-c7a2-4f07-9b0a-bbc68579b830, 0)]
31042025-03-07T23:30:03.787ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
31052025-03-07T23:30:03.790ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: ff 05 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:56053 req_id = 2f701cd0-0aed-46ee-835b-b0b3b5637c6f
31062025-03-07T23:30:03.790ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 65285,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56053 req_id = 2f701cd0-0aed-46ee-835b-b0b3b5637c6f
31072025-03-07T23:30:03.791ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
31082025-03-07T23:30:03.791ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
31092025-03-07T23:30:03.791ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:56053 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 2f701cd0-0aed-46ee-835b-b0b3b5637c6f
31102025-03-07T23:30:03.791ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31112025-03-07T23:30:03.791ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
31122025-03-07T23:30:03.792ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31132025-03-07T23:30:03.792ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3900, tv_nsec: 339686281 } })
31142025-03-07T23:30:03.792ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
31152025-03-07T23:30:03.795ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 12 29 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .)..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:56710 req_id = baa5a0ba-b10c-4948-abf9-f2cca6333593
31162025-03-07T23:30:03.795ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 4649,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56710 req_id = baa5a0ba-b10c-4948-abf9-f2cca6333593
31172025-03-07T23:30:03.795ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
31182025-03-07T23:30:03.795ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:56710 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = baa5a0ba-b10c-4948-abf9-f2cca6333593
31192025-03-07T23:30:03.860ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
31202025-03-07T23:30:03.865ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: c3 72 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c .r..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:65256 req_id = f29cb7f4-986d-4f66-8d8c-6e740c679710
31212025-03-07T23:30:03.865ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 50034,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65256 req_id = f29cb7f4-986d-4f66-8d8c-6e740c679710
31222025-03-07T23:30:03.866ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
31232025-03-07T23:30:03.866ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 50034, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:65256 req_id = f29cb7f4-986d-4f66-8d8c-6e740c679710
31242025-03-07T23:30:03.866ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
31252025-03-07T23:30:03.866ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
31262025-03-07T23:30:03.866ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
31272025-03-07T23:30:03.868ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "b2c2df71-68de-4859-9cd5-ce8788863f57", "content-length": "835", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31282025-03-07T23:30:03.868ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
31292025-03-07T23:30:03.869ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "870ed242-d760-4aaa-951f-9400a638e2b5", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31302025-03-07T23:30:03.869ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
31312025-03-07T23:30:03.871ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cf902754-e099-4d48-b214-c59c12e5b7cf", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31322025-03-07T23:30:03.871ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
31332025-03-07T23:30:03.873ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "56de1042-a56f-46c8-9f74-bd5ffdd75bf1", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31342025-03-07T23:30:03.873ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
31352025-03-07T23:30:03.875ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f5678d2b-38e9-454b-a849-5626b8131d60", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31362025-03-07T23:30:03.875ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
31372025-03-07T23:30:03.877ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "95d985e5-3f46-499e-a8b9-7721a32a4d36", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31382025-03-07T23:30:03.878ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
31392025-03-07T23:30:03.881ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d4276e0d-355c-4e64-9ff1-4f7377509345", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31402025-03-07T23:30:03.881ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
31412025-03-07T23:30:03.884ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7e079c48-6fc3-4b5c-ba4b-900483ed4600", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31422025-03-07T23:30:03.884ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
31432025-03-07T23:30:03.885ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4b35899-6954-45d0-94cb-f2dc3b9f06dd", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31442025-03-07T23:30:03.885ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
31452025-03-07T23:30:03.886ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d47d388f-8925-4985-a382-ee989eed4a70", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31462025-03-07T23:30:03.887ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
31472025-03-07T23:30:03.888ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c988423d-7431-46c3-a691-e55fbf878720", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31482025-03-07T23:30:03.888ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
31492025-03-07T23:30:03.889ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "30b2ab7b-76e2-47f3-8d79-634179a04075", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31502025-03-07T23:30:03.889ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
31512025-03-07T23:30:03.890ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d2e27dfa-2626-4ac1-a4e5-d9a6032676fa", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31522025-03-07T23:30:03.891ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
31532025-03-07T23:30:03.892ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9e49a2b-8bd3-4bed-9f48-f112d936cc28", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31542025-03-07T23:30:03.892ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
31552025-03-07T23:30:03.894ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9b3aa52f-29fb-4497-be4d-c2f945f3d3ca", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31562025-03-07T23:30:03.894ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
31572025-03-07T23:30:03.895ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9a23b793-0e34-4ca6-b649-ded175cf8043", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31582025-03-07T23:30:03.895ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
31592025-03-07T23:30:03.897ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0b3b070b-89ae-4248-b0ac-0e91eb6d9640", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31602025-03-07T23:30:03.897ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
31612025-03-07T23:30:03.899ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "615f4870-4590-4631-8eca-758f15436509", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31622025-03-07T23:30:03.899ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
31632025-03-07T23:30:03.900ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8d6ea5b3-4e18-4310-a7f3-df20451f6fdd", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31642025-03-07T23:30:03.900ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
31652025-03-07T23:30:03.901ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "862adb9a-f79a-4f0c-86aa-c09333779c64", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31662025-03-07T23:30:03.901ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
31672025-03-07T23:30:03.902ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed756852-a6e8-4e1d-8770-b0974d842631", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31682025-03-07T23:30:03.902ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
31692025-03-07T23:30:03.903ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "666fb4b3-0855-42c3-b5b5-57e93c688378", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31702025-03-07T23:30:03.903ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
31712025-03-07T23:30:03.904ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "dab80f5e-7739-4de9-85b5-7e962a61fa75", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31722025-03-07T23:30:03.904ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
31732025-03-07T23:30:03.906ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "71c63b6c-d764-4071-8410-6b5dcc6bb2f6", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31742025-03-07T23:30:03.906ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
31752025-03-07T23:30:03.908ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d2e7d66-1dcc-44d1-ae8d-e3a7a002876f", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31762025-03-07T23:30:03.908ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
31772025-03-07T23:30:03.910ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c6a61e91-c7d7-46fc-8fc3-7115796b37db", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31782025-03-07T23:30:03.910ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
31792025-03-07T23:30:03.912ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fbd04095-c895-4654-b797-96b8bad70e5f", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31802025-03-07T23:30:03.912ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
31812025-03-07T23:30:03.914ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2b772586-d986-4631-9b10-d27518c43206", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31822025-03-07T23:30:03.914ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
31832025-03-07T23:30:03.915ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d23e4cd0-e449-4704-919e-a41abdbde10c", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31842025-03-07T23:30:03.915ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
31852025-03-07T23:30:03.917ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0120fefb-ce1a-4a8e-a7c2-453000a82724", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31862025-03-07T23:30:03.917ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
31872025-03-07T23:30:03.918ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ebe301fb-c179-4427-8ed5-d1c6b0692fc7", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31882025-03-07T23:30:03.918ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
31892025-03-07T23:30:03.920ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c7710381-5b07-4ca5-8f0f-bbd9955cca08", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31902025-03-07T23:30:03.920ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
31912025-03-07T23:30:03.922ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "89506af4-dfe0-4b57-a5f3-fd36cc6f7037", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31922025-03-07T23:30:03.922ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
31932025-03-07T23:30:03.923ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e21cdbd7-ff88-48a4-9b45-092f57537b7c", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31942025-03-07T23:30:03.924ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
31952025-03-07T23:30:03.924ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
31962025-03-07T23:30:03.925ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2a37c165-11c6-45ce-ac0a-50f10f04ef6e", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31972025-03-07T23:30:03.926ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
31982025-03-07T23:30:03.928ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a478f70-af91-40db-884b-a522e09af1b4", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
31992025-03-07T23:30:03.928ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
32002025-03-07T23:30:03.930ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "51145015-7a0b-4c80-9f5d-c49c5a52ea74", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32012025-03-07T23:30:03.930ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
32022025-03-07T23:30:03.932ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8bd9d0c9-c09d-4586-bdf0-b9272a5127a1", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32032025-03-07T23:30:03.932ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
32042025-03-07T23:30:03.934ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8372f96a-e65f-47c6-913d-2a7d1270fabc", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32052025-03-07T23:30:03.934ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
32062025-03-07T23:30:03.936ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7345217b-9ead-4d50-a5cf-ccccff2c41c7", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32072025-03-07T23:30:03.936ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
32082025-03-07T23:30:03.938ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed8328b4-cd3a-4c45-b5e6-8b8462bb1c75", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32092025-03-07T23:30:03.938ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
32102025-03-07T23:30:03.942ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2e1a6c73-8bd5-460d-a1b7-14601d84f388", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32112025-03-07T23:30:03.943ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
32122025-03-07T23:30:03.944ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bdfa7b08-6620-4867-a25d-6b8ad6f538fe", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32132025-03-07T23:30:03.944ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
32142025-03-07T23:30:03.945ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a9dc1dc3-2d60-45ce-96fb-6414ee7d758d", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32152025-03-07T23:30:03.945ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
32162025-03-07T23:30:03.946ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a6667a2b-3dd1-4caf-b079-be495dbf6be7", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32172025-03-07T23:30:03.946ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
32182025-03-07T23:30:03.946ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32192025-03-07T23:30:03.946ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32202025-03-07T23:30:03.946ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32212025-03-07T23:30:03.948ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32222025-03-07T23:30:03.954ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32232025-03-07T23:30:03.961ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
32242025-03-07T23:30:03.961ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
32252025-03-07T23:30:03.961ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32262025-03-07T23:30:03.961ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32272025-03-07T23:30:03.961ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32282025-03-07T23:30:03.962ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32292025-03-07T23:30:03.969ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32302025-03-07T23:30:03.974ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
32312025-03-07T23:30:03.974ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32322025-03-07T23:30:03.974ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32332025-03-07T23:30:03.974ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32342025-03-07T23:30:03.975ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
32352025-03-07T23:30:03.975ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32362025-03-07T23:30:03.975ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32372025-03-07T23:30:03.975ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32382025-03-07T23:30:03.976ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32392025-03-07T23:30:04.086ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
32402025-03-07T23:30:04.086ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
32412025-03-07T23:30:04.088ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:64002 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32422025-03-07T23:30:04.088ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32432025-03-07T23:30:04.097ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
32442025-03-07T23:30:04.097ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32452025-03-07T23:30:04.097ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32462025-03-07T23:30:04.097ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32472025-03-07T23:30:04.098ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:64002 req_id = c88c7799-49a9-48da-a9bd-45704ea054cd sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
32482025-03-07T23:30:04.098ZINFOtest_unauthorized (dropshot): request completed latency_us = 1001 local_addr = [::1]:57532 method = GET remote_addr = [::1]:64002 req_id = c88c7799-49a9-48da-a9bd-45704ea054cd response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
32492025-03-07T23:30:04.099ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "c88c7799-49a9-48da-a9bd-45704ea054cd", "content-length": "3141", "date": "Fri, 07 Mar 2025 23:30:03 GMT"} })
32502025-03-07T23:30:04.101ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
32512025-03-07T23:30:04.101ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
32522025-03-07T23:30:04.101ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
32532025-03-07T23:30:04.103ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
32542025-03-07T23:30:04.103ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32552025-03-07T23:30:04.103ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32562025-03-07T23:30:04.103ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32572025-03-07T23:30:04.105ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32582025-03-07T23:30:04.117ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32592025-03-07T23:30:04.117ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32602025-03-07T23:30:04.118ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32612025-03-07T23:30:04.136ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32622025-03-07T23:30:04.141ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
32632025-03-07T23:30:04.141ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32642025-03-07T23:30:04.141ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32652025-03-07T23:30:04.142ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32662025-03-07T23:30:04.156ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
32672025-03-07T23:30:04.156ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
32682025-03-07T23:30:04.282ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
32692025-03-07T23:30:04.356ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
32702025-03-07T23:30:04.356ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32712025-03-07T23:30:04.356ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32722025-03-07T23:30:04.356ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32732025-03-07T23:30:04.357ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32742025-03-07T23:30:04.362ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32752025-03-07T23:30:04.374ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
32762025-03-07T23:30:04.374ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32772025-03-07T23:30:04.374ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
32782025-03-07T23:30:04.374ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32792025-03-07T23:30:04.670ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = ec2a7056-c5d3-4008-b06b-369de20c1466
32802025-03-07T23:30:04.670ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = ec2a7056-c5d3-4008-b06b-369de20c1466 time_started = 2025-03-07 23:30:03.866382 UTC
32812025-03-07T23:30:04.671ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 913.364174ms iteration = 4 status = {"collection_id":"ec2a7056-c5d3-4008-b06b-369de20c1466","time_done":"2025-03-07 23:30:04.101388 UTC","time_started":"2025-03-07 23:30:03.866382 UTC"}
32822025-03-07T23:30:04.671ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 5 reason = Signaled
32832025-03-07T23:30:04.671ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
32842025-03-07T23:30:04.671ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32852025-03-07T23:30:04.671ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32862025-03-07T23:30:04.671ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32872025-03-07T23:30:04.672ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32882025-03-07T23:30:04.672ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 4 reason = Dependency
32892025-03-07T23:30:04.672ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
32902025-03-07T23:30:04.672ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 44.532\u{b5}s iteration = 4 status = {"error":"no blueprint"}
32912025-03-07T23:30:04.672ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 4 reason = Dependency
32922025-03-07T23:30:04.672ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 12.583\u{b5}s iteration = 4 status = {"error":"task disabled"}
32932025-03-07T23:30:04.674ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
32942025-03-07T23:30:04.680ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
32952025-03-07T23:30:04.680ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
32962025-03-07T23:30:04.680ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32972025-03-07T23:30:04.681ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32982025-03-07T23:30:04.681ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32992025-03-07T23:30:04.681ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33002025-03-07T23:30:04.682ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33012025-03-07T23:30:04.685ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(5451549d-bcf7-4193-a1a6-8ba2254b9fb4, 0), (a6c0cac9-c7a2-4f07-9b0a-bbc68579b830, 0), (ec2a7056-c5d3-4008-b06b-369de20c1466, 0)]
33022025-03-07T23:30:04.685ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
33032025-03-07T23:30:04.687ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: fd a5 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:53937 req_id = ffcbdff3-f367-4ee6-968d-4c6c2de6c5c9
33042025-03-07T23:30:04.687ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 64933,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53937 req_id = ffcbdff3-f367-4ee6-968d-4c6c2de6c5c9
33052025-03-07T23:30:04.687ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
33062025-03-07T23:30:04.687ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
33072025-03-07T23:30:04.687ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:53937 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = ffcbdff3-f367-4ee6-968d-4c6c2de6c5c9
33082025-03-07T23:30:04.688ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3901, tv_nsec: 235011398 } })
33092025-03-07T23:30:04.688ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
33102025-03-07T23:30:04.689ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: ea 43 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .C..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:62710 req_id = ed6aae0c-780c-4562-afa7-6582ea6f0d51
33112025-03-07T23:30:04.689ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 59971,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62710 req_id = ed6aae0c-780c-4562-afa7-6582ea6f0d51
33122025-03-07T23:30:04.689ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
33132025-03-07T23:30:04.689ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62710 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = ed6aae0c-780c-4562-afa7-6582ea6f0d51
33142025-03-07T23:30:04.765ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
33152025-03-07T23:30:04.850ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:34193/metrics/producers
33162025-03-07T23:30:04.855ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:64281
33172025-03-07T23:30:04.857ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 6c 61 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c la..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:51530 req_id = dde3d918-637b-4fdb-810d-428d91aad91e
33182025-03-07T23:30:04.857ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 27745,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51530 req_id = dde3d918-637b-4fdb-810d-428d91aad91e
33192025-03-07T23:30:04.857ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
33202025-03-07T23:30:04.857ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 27745, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:51530 req_id = dde3d918-637b-4fdb-810d-428d91aad91e
33212025-03-07T23:30:04.858ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
33222025-03-07T23:30:04.858ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
33232025-03-07T23:30:04.858ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
33242025-03-07T23:30:04.859ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:64281 req_id = 4771d0bc-1cb8-4a3e-a21b-efa99a5981c2 uri = /metrics/producers
33252025-03-07T23:30:04.859ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:64281 req_id = 4771d0bc-1cb8-4a3e-a21b-efa99a5981c2 resource = Database uri = /metrics/producers
33262025-03-07T23:30:04.860ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:64281 req_id = 4771d0bc-1cb8-4a3e-a21b-efa99a5981c2 roles = RoleSet { roles: {} } uri = /metrics/producers
33272025-03-07T23:30:04.860ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:64281 req_id = 4771d0bc-1cb8-4a3e-a21b-efa99a5981c2 resource = Database result = Ok(()) uri = /metrics/producers
33282025-03-07T23:30:04.877ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "63e49f8d-9e98-4146-b758-aa3a02fcea81", "content-length": "835", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33292025-03-07T23:30:04.878ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
33302025-03-07T23:30:04.901ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "26788626-d6e8-412b-87be-4dbd72542055", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33312025-03-07T23:30:04.902ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
33322025-03-07T23:30:04.916ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "31fcc2a9-6aae-4c1e-ab03-af04ed4c8c22", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33332025-03-07T23:30:04.916ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
33342025-03-07T23:30:04.920ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
33352025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33362025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33372025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33382025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33392025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33402025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33412025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33422025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33432025-03-07T23:30:04.921ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47503 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
33442025-03-07T23:30:04.921ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:47503 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
33452025-03-07T23:30:04.922ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:47503 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
33462025-03-07T23:30:04.922ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:47503 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
33472025-03-07T23:30:04.922ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = 7cbf6a4b-2089-4437-b900-c519612c1f9a serial = totally-unique-serial: 7cbf6a4b-2089-4437-b900-c519612c1f9a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
33482025-03-07T23:30:04.922ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
33492025-03-07T23:30:04.922ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33502025-03-07T23:30:04.923ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33512025-03-07T23:30:04.926ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e0f2624d-5f45-4621-a6c5-004ba0ee8e8c", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33522025-03-07T23:30:04.926ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
33532025-03-07T23:30:04.927ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
33542025-03-07T23:30:04.927ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33552025-03-07T23:30:04.928ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33562025-03-07T23:30:04.929ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
33572025-03-07T23:30:04.929ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
33582025-03-07T23:30:04.929ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
33592025-03-07T23:30:04.929ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
33602025-03-07T23:30:04.933ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
33612025-03-07T23:30:04.934ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d08e6816-3c50-4957-867e-feee46919fec", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33622025-03-07T23:30:04.934ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
33632025-03-07T23:30:04.937ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0b1a6120-f5d6-44b4-a945-184b564266a9", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33642025-03-07T23:30:04.937ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
33652025-03-07T23:30:04.937ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
33662025-03-07T23:30:04.945ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
33672025-03-07T23:30:04.947ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2cc919ca-8408-43ad-9bf1-ffea2dc3145a", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33682025-03-07T23:30:04.949ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
33692025-03-07T23:30:04.950ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f531a028-3e7c-4fdf-bcb1-b45f9ac9f985", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33702025-03-07T23:30:04.950ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
33712025-03-07T23:30:04.951ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7be45306-cd4e-4a12-9208-fe6e73caefc6", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33722025-03-07T23:30:04.951ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
33732025-03-07T23:30:04.952ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "62499198-b346-4881-80de-6da4d85ea3bc", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33742025-03-07T23:30:04.953ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
33752025-03-07T23:30:04.954ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "772c68d3-6ff6-430e-92a8-38aa499f8117", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33762025-03-07T23:30:04.954ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
33772025-03-07T23:30:04.960ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd17af2d-2b01-4216-8c44-c18fc914a444", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33782025-03-07T23:30:04.961ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
33792025-03-07T23:30:04.963ZINFOtest_unauthorized (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
33802025-03-07T23:30:04.963ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 104053 local_addr = 127.0.0.1:34193 method = POST remote_addr = 127.0.0.1:64281 req_id = 4771d0bc-1cb8-4a3e-a21b-efa99a5981c2 response_code = 201 uri = /metrics/producers
33812025-03-07T23:30:04.964ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a9747ca9-8cc4-4a0d-be46-96cf96c872e9", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33822025-03-07T23:30:04.964ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
33832025-03-07T23:30:04.964ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "4771d0bc-1cb8-4a3e-a21b-efa99a5981c2", "content-length": "41", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33842025-03-07T23:30:04.967ZDEBGtest_unauthorized (producer-registration-task): registered with nexus successfully
33852025-03-07T23:30:04.967ZDEBGtest_unauthorized (producer-registration-task): pausing until time to renew lease lease_duration = 600s wait_period = 150s
33862025-03-07T23:30:04.972ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "fbd90298-bae3-420f-bb90-271252a3fdfb", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33872025-03-07T23:30:04.973ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
33882025-03-07T23:30:04.976ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "06de7fb9-3f1e-49a1-a04d-8a1c344f3b0d", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33892025-03-07T23:30:04.976ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
33902025-03-07T23:30:04.979ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7424299d-ece8-4f21-8a3b-c3773f7a2231", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33912025-03-07T23:30:04.980ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
33922025-03-07T23:30:04.984ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0f0b6c63-5407-466e-91bf-265bd4dc4360", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33932025-03-07T23:30:04.984ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
33942025-03-07T23:30:04.988ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1e9bbc2e-fc86-4928-b207-325e2a7cc2e1", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33952025-03-07T23:30:04.989ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
33962025-03-07T23:30:04.991ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5740f71c-4fcb-4b46-a489-89862044c991", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33972025-03-07T23:30:04.992ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
33982025-03-07T23:30:04.993ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d4abc31f-0196-45d6-b555-e8abe755adc4", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
33992025-03-07T23:30:04.993ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
34002025-03-07T23:30:04.995ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7460c5f2-1627-471e-94c5-39a814d7c0d2", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34012025-03-07T23:30:04.995ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
34022025-03-07T23:30:04.996ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3a1afd51-8e89-4d56-9dd7-9fedd0cc287f", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34032025-03-07T23:30:04.996ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
34042025-03-07T23:30:04.997ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "32343343-5612-4a74-82cd-185f7bceee7c", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34052025-03-07T23:30:04.998ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
34062025-03-07T23:30:05.004ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d57a0786-1c74-4590-aca8-746ee2e07625", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34072025-03-07T23:30:05.004ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
34082025-03-07T23:30:05.007ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "11bcc0c9-d805-4546-aa06-6724a5982309", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34092025-03-07T23:30:05.007ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
34102025-03-07T23:30:05.009ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "82819af0-f53c-4175-b2e6-025740908167", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34112025-03-07T23:30:05.013ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
34122025-03-07T23:30:05.014ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8c7c7a45-5187-4dbc-8fb4-195747e9fae1", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34132025-03-07T23:30:05.014ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
34142025-03-07T23:30:05.017ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4a789a7a-c31b-4047-9ac0-535a7e5741f4", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34152025-03-07T23:30:05.018ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
34162025-03-07T23:30:05.024ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6d0ff2c4-3f44-4fc5-aa75-9037dc8e513e", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34172025-03-07T23:30:05.024ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
34182025-03-07T23:30:05.026ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "978a24a2-2ba6-4823-ba8a-26d75c0ece66", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34192025-03-07T23:30:05.026ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
34202025-03-07T23:30:05.027ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b58c6aaa-e6e0-4d88-8188-6167ff8a209c", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34212025-03-07T23:30:05.027ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
34222025-03-07T23:30:05.027ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8232b7e4-e69f-4f6b-99d5-1eda6e61ecb6", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34232025-03-07T23:30:05.028ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
34242025-03-07T23:30:05.029ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "278b236e-f3d4-4245-90c3-740a9a1cbd03", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34252025-03-07T23:30:05.029ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
34262025-03-07T23:30:05.030ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cbfaff0c-c6f4-4952-8eff-6d01f39febb3", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34272025-03-07T23:30:05.030ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
34282025-03-07T23:30:05.031ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "13f20b63-f969-4af7-9f22-0893e554471a", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34292025-03-07T23:30:05.032ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
34302025-03-07T23:30:05.035ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a75368ac-d699-49ec-a756-a42e80d8239a", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34312025-03-07T23:30:05.035ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
34322025-03-07T23:30:05.037ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3eebde99-27bb-4069-9b94-a63fc8e440d0", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34332025-03-07T23:30:05.037ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
34342025-03-07T23:30:05.040ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2f302a95-5cc5-4fec-bace-11fbce0d766e", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34352025-03-07T23:30:05.041ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
34362025-03-07T23:30:05.044ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d4f94593-0bf1-4e27-b527-5434d165fea9", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34372025-03-07T23:30:05.045ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
34382025-03-07T23:30:05.047ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "23d5f4d8-9eeb-482f-8ca0-775a19136c52", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34392025-03-07T23:30:05.047ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
34402025-03-07T23:30:05.048ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3dae25f2-9143-4e58-8ddd-421b39ac113d", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34412025-03-07T23:30:05.049ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
34422025-03-07T23:30:05.050ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec693fc7-2b75-4316-abb5-2afdf85119fa", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34432025-03-07T23:30:05.050ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
34442025-03-07T23:30:05.051ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b14a1cc1-0850-4203-adf3-6ba239c7ce44", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34452025-03-07T23:30:05.051ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
34462025-03-07T23:30:05.052ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d78ffd0-fc30-4951-b521-ffb14f0bf67c", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34472025-03-07T23:30:05.052ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
34482025-03-07T23:30:05.055ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "225715b2-8aa0-4878-9254-5fd82a4a9227", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34492025-03-07T23:30:05.056ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
34502025-03-07T23:30:05.056ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34512025-03-07T23:30:05.056ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34522025-03-07T23:30:05.056ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34532025-03-07T23:30:05.056ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34542025-03-07T23:30:05.062ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34552025-03-07T23:30:05.069ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
34562025-03-07T23:30:05.069ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
34572025-03-07T23:30:05.069ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34582025-03-07T23:30:05.069ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34592025-03-07T23:30:05.069ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34602025-03-07T23:30:05.070ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34612025-03-07T23:30:05.074ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34622025-03-07T23:30:05.079ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
34632025-03-07T23:30:05.079ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34642025-03-07T23:30:05.079ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34652025-03-07T23:30:05.080ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34662025-03-07T23:30:05.353ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
34672025-03-07T23:30:05.353ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
34682025-03-07T23:30:05.354ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = 7cbf6a4b-2089-4437-b900-c519612c1f9a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 9dcb348c-3741-440e-ad18-bffcbe7ca303
34692025-03-07T23:30:05.363ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
34702025-03-07T23:30:05.363ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
34712025-03-07T23:30:05.364ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
34722025-03-07T23:30:05.364ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:42676 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
34732025-03-07T23:30:05.365ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
34742025-03-07T23:30:05.365ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
34752025-03-07T23:30:05.366ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:42676 req_id = be882f53-d9e4-4bc2-8178-14f63bb1000e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
34762025-03-07T23:30:05.367ZINFOtest_unauthorized (dropshot): request completed latency_us = 791 local_addr = [::1]:57532 method = GET remote_addr = [::1]:42676 req_id = be882f53-d9e4-4bc2-8178-14f63bb1000e response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
34772025-03-07T23:30:05.367ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
34782025-03-07T23:30:05.368ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34792025-03-07T23:30:05.368ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
34802025-03-07T23:30:05.368ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
34812025-03-07T23:30:05.369ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
34822025-03-07T23:30:05.369ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "be882f53-d9e4-4bc2-8178-14f63bb1000e", "content-length": "3515", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
34832025-03-07T23:30:05.372ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
34842025-03-07T23:30:05.372ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
34852025-03-07T23:30:05.372ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
34862025-03-07T23:30:05.386ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
34872025-03-07T23:30:05.386ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
34882025-03-07T23:30:05.386ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34892025-03-07T23:30:05.386ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34902025-03-07T23:30:05.386ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34912025-03-07T23:30:05.391ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34922025-03-07T23:30:05.394ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
34932025-03-07T23:30:05.398ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
34942025-03-07T23:30:05.400ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
34952025-03-07T23:30:05.401ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
34962025-03-07T23:30:05.401ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
34972025-03-07T23:30:05.403ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
34982025-03-07T23:30:05.411ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 zpool_id = 9dcb348c-3741-440e-ad18-bffcbe7ca303
34992025-03-07T23:30:05.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
35002025-03-07T23:30:05.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35012025-03-07T23:30:05.413ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fb9bf5f4-341b-4729-9208-89d165039edf uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35022025-03-07T23:30:05.414ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fb9bf5f4-341b-4729-9208-89d165039edf resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35032025-03-07T23:30:05.414ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fb9bf5f4-341b-4729-9208-89d165039edf roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35042025-03-07T23:30:05.421ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fb9bf5f4-341b-4729-9208-89d165039edf resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35052025-03-07T23:30:05.422ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
35062025-03-07T23:30:05.422ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35072025-03-07T23:30:05.422ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35082025-03-07T23:30:05.422ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35092025-03-07T23:30:05.423ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35102025-03-07T23:30:05.426ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35112025-03-07T23:30:05.432ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
35122025-03-07T23:30:05.432ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35132025-03-07T23:30:05.432ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35142025-03-07T23:30:05.432ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35152025-03-07T23:30:05.433ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 19863 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fb9bf5f4-341b-4729-9208-89d165039edf response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
35162025-03-07T23:30:05.434ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "fb9bf5f4-341b-4729-9208-89d165039edf", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
35172025-03-07T23:30:05.435ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
35182025-03-07T23:30:05.435ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5aa102aa-957a-44f4-92f0-b6f0fb4f86fe uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
35192025-03-07T23:30:05.436ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5aa102aa-957a-44f4-92f0-b6f0fb4f86fe resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
35202025-03-07T23:30:05.436ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5aa102aa-957a-44f4-92f0-b6f0fb4f86fe roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
35212025-03-07T23:30:05.437ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5aa102aa-957a-44f4-92f0-b6f0fb4f86fe resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
35222025-03-07T23:30:05.442ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6490 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5aa102aa-957a-44f4-92f0-b6f0fb4f86fe response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
35232025-03-07T23:30:05.443ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "5aa102aa-957a-44f4-92f0-b6f0fb4f86fe", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:04 GMT"} })
35242025-03-07T23:30:05.443ZDEBGtest_unauthorized (oximeter-agent): registered new metric producer address = 127.0.0.1:52350 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
35252025-03-07T23:30:05.557ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
35262025-03-07T23:30:05.561ZDEBGtest_unauthorized (oximeter-agent): registered new metric producer address = [::1]:44939 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
35272025-03-07T23:30:05.641ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
35282025-03-07T23:30:05.644ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
35292025-03-07T23:30:05.798ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = af63e68d-565b-4f56-b7f6-7258c4fae122
35302025-03-07T23:30:05.798ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = af63e68d-565b-4f56-b7f6-7258c4fae122 time_started = 2025-03-07 23:30:04.858610 UTC
35312025-03-07T23:30:05.798ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 1.127804437s iteration = 5 status = {"collection_id":"af63e68d-565b-4f56-b7f6-7258c4fae122","time_done":"2025-03-07 23:30:05.372518 UTC","time_started":"2025-03-07 23:30:04.858610 UTC"}
35322025-03-07T23:30:05.799ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 6 reason = Signaled
35332025-03-07T23:30:05.799ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
35342025-03-07T23:30:05.799ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35352025-03-07T23:30:05.799ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35362025-03-07T23:30:05.799ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35372025-03-07T23:30:05.800ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35382025-03-07T23:30:05.800ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 5 reason = Dependency
35392025-03-07T23:30:05.800ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 19.326\u{b5}s iteration = 5 status = {"error":"task disabled"}
35402025-03-07T23:30:05.800ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 5 reason = Dependency
35412025-03-07T23:30:05.800ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
35422025-03-07T23:30:05.800ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 18.506\u{b5}s iteration = 5 status = {"error":"no blueprint"}
35432025-03-07T23:30:05.801ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35442025-03-07T23:30:05.806ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
35452025-03-07T23:30:05.806ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35462025-03-07T23:30:05.806ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35472025-03-07T23:30:05.806ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35482025-03-07T23:30:05.807ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35492025-03-07T23:30:05.807ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35502025-03-07T23:30:05.807ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35512025-03-07T23:30:05.810ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: eligible for removal background_task = inventory_collection candidates = [(5451549d-bcf7-4193-a1a6-8ba2254b9fb4, 0), (a6c0cac9-c7a2-4f07-9b0a-bbc68579b830, 0), (ec2a7056-c5d3-4008-b06b-369de20c1466, 0), (af63e68d-565b-4f56-b7f6-7258c4fae122, 0)] collection_id = 5451549d-bcf7-4193-a1a6-8ba2254b9fb4
35522025-03-07T23:30:05.810ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35532025-03-07T23:30:05.810ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35542025-03-07T23:30:05.810ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35552025-03-07T23:30:05.855ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
35562025-03-07T23:30:05.856ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35572025-03-07T23:30:05.856ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35582025-03-07T23:30:05.856ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35592025-03-07T23:30:05.856ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35602025-03-07T23:30:05.856ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35612025-03-07T23:30:05.857ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35622025-03-07T23:30:05.857ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35632025-03-07T23:30:05.857ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35642025-03-07T23:30:05.857ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:45686 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
35652025-03-07T23:30:05.857ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:45686 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
35662025-03-07T23:30:05.857ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:45686 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
35672025-03-07T23:30:05.858ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:45686 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
35682025-03-07T23:30:05.858ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = b43176dc-cd4f-4c3e-92bb-4bfecab69ea5 serial = totally-unique-serial: b43176dc-cd4f-4c3e-92bb-4bfecab69ea5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
35692025-03-07T23:30:05.858ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35702025-03-07T23:30:05.858ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35712025-03-07T23:30:05.859ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35722025-03-07T23:30:05.859ZINFOtest_unauthorized (BackgroundTasks): removed inventory collection background_task = inventory_collection collection_id = 5451549d-bcf7-4193-a1a6-8ba2254b9fb4 ncabooses = 24 nclickhouse_keeper_membership = 0 ncollections = 1 ndatasets = 0 nerrors = 0 nnics = 2 nnvme_disk_firmware = 0 nphysical_disks = 0 nrot_pages = 16 nrots = 4 nsled_agent_zones = 1 nsled_agents = 1 nsps = 4 nzones = 6 nzpools = 0
35732025-03-07T23:30:05.860ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
35742025-03-07T23:30:05.860ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
35752025-03-07T23:30:05.861ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
35762025-03-07T23:30:05.862ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35772025-03-07T23:30:05.862ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35782025-03-07T23:30:05.863ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35792025-03-07T23:30:05.864ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(a6c0cac9-c7a2-4f07-9b0a-bbc68579b830, 0), (ec2a7056-c5d3-4008-b06b-369de20c1466, 0), (af63e68d-565b-4f56-b7f6-7258c4fae122, 0)]
35802025-03-07T23:30:05.865ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
35812025-03-07T23:30:05.866ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
35822025-03-07T23:30:05.866ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
35832025-03-07T23:30:05.866ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
35842025-03-07T23:30:05.866ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
35852025-03-07T23:30:05.867ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
35862025-03-07T23:30:05.869ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: fb bb 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:52479 req_id = cc3c0968-f0d3-499a-a847-3dad7d5edd2c
35872025-03-07T23:30:05.870ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 64443,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52479 req_id = cc3c0968-f0d3-499a-a847-3dad7d5edd2c
35882025-03-07T23:30:05.870ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
35892025-03-07T23:30:05.870ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
35902025-03-07T23:30:05.870ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:52479 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = cc3c0968-f0d3-499a-a847-3dad7d5edd2c
35912025-03-07T23:30:05.874ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3902, tv_nsec: 421434163 } })
35922025-03-07T23:30:05.874ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
35932025-03-07T23:30:05.875ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: a8 cb 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:61909 req_id = 1680ba69-a43b-4241-82f5-92023ccecb62
35942025-03-07T23:30:05.875ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 43211,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61909 req_id = 1680ba69-a43b-4241-82f5-92023ccecb62
35952025-03-07T23:30:05.875ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
35962025-03-07T23:30:05.875ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:61909 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 1680ba69-a43b-4241-82f5-92023ccecb62
35972025-03-07T23:30:05.875ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
35982025-03-07T23:30:05.884ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
35992025-03-07T23:30:06.109ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
36002025-03-07T23:30:06.111ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: c7 82 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:54685 req_id = 813657ee-6780-4e1e-8991-984cced89718
36012025-03-07T23:30:06.111ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 51074,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54685 req_id = 813657ee-6780-4e1e-8991-984cced89718
36022025-03-07T23:30:06.111ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
36032025-03-07T23:30:06.111ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 51074, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:54685 req_id = 813657ee-6780-4e1e-8991-984cced89718
36042025-03-07T23:30:06.111ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
36052025-03-07T23:30:06.111ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
36062025-03-07T23:30:06.111ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
36072025-03-07T23:30:06.116ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "90066e14-ad3c-4d6c-a418-99c36e346f89", "content-length": "835", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36082025-03-07T23:30:06.116ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
36092025-03-07T23:30:06.118ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e5db095e-bd31-4cc5-8359-d920bcee6bc8", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36102025-03-07T23:30:06.119ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
36112025-03-07T23:30:06.123ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e58774c-bbef-4618-8a11-c3e458b5c179", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36122025-03-07T23:30:06.127ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
36132025-03-07T23:30:06.127ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = b43176dc-cd4f-4c3e-92bb-4bfecab69ea5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = d150ed47-35a1-423a-b216-759535a68878
36142025-03-07T23:30:06.128ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36152025-03-07T23:30:06.128ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36162025-03-07T23:30:06.129ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36172025-03-07T23:30:06.131ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a69ea538-c48b-4427-aa35-24f88b6904f2", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36182025-03-07T23:30:06.131ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
36192025-03-07T23:30:06.132ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
36202025-03-07T23:30:06.132ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36212025-03-07T23:30:06.132ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36222025-03-07T23:30:06.132ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36232025-03-07T23:30:06.133ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36242025-03-07T23:30:06.135ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4caecfbb-0e0e-49f2-888e-785837e139c7", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36252025-03-07T23:30:06.135ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
36262025-03-07T23:30:06.135ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
36272025-03-07T23:30:06.138ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
36282025-03-07T23:30:06.141ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bf796c59-7a59-45a9-9355-ea3609201dc3", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36292025-03-07T23:30:06.141ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
36302025-03-07T23:30:06.145ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = e623ce6a-105d-42bb-89b1-f0546be9ed27 zpool_id = d150ed47-35a1-423a-b216-759535a68878
36312025-03-07T23:30:06.147ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f1739a80-9234-40d9-bd16-041882107164", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36322025-03-07T23:30:06.149ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
36332025-03-07T23:30:06.154ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "87c3e25c-fb12-41cd-9bf0-0cdb5b51d6e1", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36342025-03-07T23:30:06.154ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
36352025-03-07T23:30:06.155ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
36362025-03-07T23:30:06.155ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36372025-03-07T23:30:06.155ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36382025-03-07T23:30:06.155ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36392025-03-07T23:30:06.156ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36402025-03-07T23:30:06.158ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
36412025-03-07T23:30:06.158ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
36422025-03-07T23:30:06.159ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9dd1f4b6-28cd-490d-ad4e-7ed0d5b174a9", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36432025-03-07T23:30:06.160ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
36442025-03-07T23:30:06.160ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
36452025-03-07T23:30:06.171ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
36462025-03-07T23:30:06.171ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36472025-03-07T23:30:06.171ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36482025-03-07T23:30:06.172ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36492025-03-07T23:30:06.177ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bade7a3e-ddb9-4ba3-96e6-a62c8f088349", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36502025-03-07T23:30:06.177ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
36512025-03-07T23:30:06.178ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36522025-03-07T23:30:06.178ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36532025-03-07T23:30:06.179ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36542025-03-07T23:30:06.180ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "624cb3db-eb8c-4d80-a381-8cc3b6d9b6a9", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36552025-03-07T23:30:06.180ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
36562025-03-07T23:30:06.182ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "45be6f9a-630a-4055-b355-0042f9dc6425", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36572025-03-07T23:30:06.182ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
36582025-03-07T23:30:06.189ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4d0f78ad-eb49-47d5-a892-7fd564c9da6e", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36592025-03-07T23:30:06.189ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
36602025-03-07T23:30:06.196ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1163b012-0628-4563-b2a3-305f5115f462", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36612025-03-07T23:30:06.196ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
36622025-03-07T23:30:06.220ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "dac04f1c-9da5-46f7-9f35-c5d5f3f64fab", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36632025-03-07T23:30:06.220ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
36642025-03-07T23:30:06.226ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e3f3cedd-5f86-4327-af3a-e09f411db270", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36652025-03-07T23:30:06.226ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
36662025-03-07T23:30:06.239ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
36672025-03-07T23:30:06.241ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "576c5738-1704-4a3d-b8f5-8cb6baeb4617", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36682025-03-07T23:30:06.241ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
36692025-03-07T23:30:06.245ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "85d22682-93a4-4b65-8494-6941c6440066", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36702025-03-07T23:30:06.246ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
36712025-03-07T23:30:06.254ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "250b3336-ec21-4f00-b286-8cc3c907cbc0", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36722025-03-07T23:30:06.254ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
36732025-03-07T23:30:06.257ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f1e03b59-2ae3-4276-8156-36567054bafe", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36742025-03-07T23:30:06.257ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
36752025-03-07T23:30:06.258ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "770b9ab1-4af7-4d5c-9975-6cdc555b2dc9", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36762025-03-07T23:30:06.258ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
36772025-03-07T23:30:06.260ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8db8979b-580f-40ae-8ca9-f2c9c923a59d", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36782025-03-07T23:30:06.260ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
36792025-03-07T23:30:06.261ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "11704025-659e-4261-9a84-a0632e9e084d", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36802025-03-07T23:30:06.262ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
36812025-03-07T23:30:06.264ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c82a0ff0-e5fa-47ac-b121-2fc9372bc1aa", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36822025-03-07T23:30:06.264ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
36832025-03-07T23:30:06.269ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5f08b508-5728-49c5-8d01-f3777dac98fd", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36842025-03-07T23:30:06.269ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
36852025-03-07T23:30:06.274ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6cce1b38-a0fc-46b9-9e6d-0931a1818db8", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36862025-03-07T23:30:06.274ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
36872025-03-07T23:30:06.279ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c99fe2aa-3ce8-4fc3-bd33-a2b4b44f93c6", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36882025-03-07T23:30:06.280ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
36892025-03-07T23:30:06.286ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad449a2f-3211-4b95-b4fd-4d88d648d7d7", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36902025-03-07T23:30:06.286ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
36912025-03-07T23:30:06.289ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5c4ed8e8-58e7-4c5f-8cd6-04327d014255", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
36922025-03-07T23:30:06.289ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
36932025-03-07T23:30:06.290ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
36942025-03-07T23:30:06.290ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36952025-03-07T23:30:06.290ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
36962025-03-07T23:30:06.291ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
36972025-03-07T23:30:06.291ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
36982025-03-07T23:30:06.294ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
36992025-03-07T23:30:06.351ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
37002025-03-07T23:30:06.351ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37012025-03-07T23:30:06.351ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37022025-03-07T23:30:06.352ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37032025-03-07T23:30:06.354ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a60057ee-f0a7-40ba-bdb9-7eca65e81d81", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37042025-03-07T23:30:06.355ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
37052025-03-07T23:30:06.355ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37062025-03-07T23:30:06.355ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37072025-03-07T23:30:06.356ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37082025-03-07T23:30:06.358ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3e0b1c1d-73b8-4cc4-97ef-d69bfcab5ed4", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37092025-03-07T23:30:06.358ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
37102025-03-07T23:30:06.360ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a96eb081-65be-4d2d-9946-91c8af606ba2", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37112025-03-07T23:30:06.360ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
37122025-03-07T23:30:06.395ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3ec6e0b6-87c8-4a3a-ba3d-99a8316a74b5", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37132025-03-07T23:30:06.395ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
37142025-03-07T23:30:06.397ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7b02266b-9b88-438f-8214-da848c2a7c6c", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37152025-03-07T23:30:06.397ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
37162025-03-07T23:30:06.403ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b6d0265b-5903-41cc-8249-65e95470bb1c", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37172025-03-07T23:30:06.403ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
37182025-03-07T23:30:06.405ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "be624b15-bf68-4b89-9722-36a596f82998", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37192025-03-07T23:30:06.406ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
37202025-03-07T23:30:06.408ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "359ff778-7579-44d7-8af6-d42dab5cd6bb", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37212025-03-07T23:30:06.408ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
37222025-03-07T23:30:06.414ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "28a86e0b-d7f2-4540-8480-ebea39dfd418", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37232025-03-07T23:30:06.425ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
37242025-03-07T23:30:06.428ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "02fce94f-e008-49d8-9f2b-8a06211c8936", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37252025-03-07T23:30:06.428ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
37262025-03-07T23:30:06.431ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a1196fe6-2dd0-4ae9-ab4c-e50b9c21334c", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37272025-03-07T23:30:06.431ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
37282025-03-07T23:30:06.434ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bc526dd8-8864-4106-b7de-24c9247099f8", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37292025-03-07T23:30:06.434ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
37302025-03-07T23:30:06.443ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
37312025-03-07T23:30:06.443ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "83aa2aec-7613-4aa0-9451-49e59d66e10f", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37322025-03-07T23:30:06.443ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
37332025-03-07T23:30:06.446ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5037c0d4-25e4-4ad9-a7b4-a656af03b20f", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37342025-03-07T23:30:06.446ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
37352025-03-07T23:30:06.447ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f4223711-ec02-401d-8881-b6081be716e8", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37362025-03-07T23:30:06.447ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
37372025-03-07T23:30:06.448ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "30404646-4139-4641-a3e3-6a59e0637934", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37382025-03-07T23:30:06.448ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
37392025-03-07T23:30:06.449ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37402025-03-07T23:30:06.449ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37412025-03-07T23:30:06.449ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37422025-03-07T23:30:06.449ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37432025-03-07T23:30:06.452ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37442025-03-07T23:30:06.460ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
37452025-03-07T23:30:06.460ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
37462025-03-07T23:30:06.461ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37472025-03-07T23:30:06.461ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37482025-03-07T23:30:06.463ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37492025-03-07T23:30:06.466ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37502025-03-07T23:30:06.541ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
37512025-03-07T23:30:06.541ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37522025-03-07T23:30:06.541ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37532025-03-07T23:30:06.541ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37542025-03-07T23:30:06.542ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37552025-03-07T23:30:06.543ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37562025-03-07T23:30:06.549ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
37572025-03-07T23:30:06.550ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37582025-03-07T23:30:06.550ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37592025-03-07T23:30:06.551ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37602025-03-07T23:30:06.552ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37612025-03-07T23:30:06.560ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
37622025-03-07T23:30:06.563ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37632025-03-07T23:30:06.563ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37642025-03-07T23:30:06.564ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37652025-03-07T23:30:06.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37662025-03-07T23:30:06.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37672025-03-07T23:30:06.566ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37682025-03-07T23:30:06.566ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37692025-03-07T23:30:06.568ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37702025-03-07T23:30:06.570ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37712025-03-07T23:30:06.571ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37722025-03-07T23:30:06.571ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37732025-03-07T23:30:06.571ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37742025-03-07T23:30:06.715ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
37752025-03-07T23:30:06.715ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
37762025-03-07T23:30:06.717ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:43373 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
37772025-03-07T23:30:06.717ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:43373 req_id = 14099a36-eeef-4572-91fa-2323555940c5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
37782025-03-07T23:30:06.718ZINFOtest_unauthorized (dropshot): request completed latency_us = 874 local_addr = [::1]:57532 method = GET remote_addr = [::1]:43373 req_id = 14099a36-eeef-4572-91fa-2323555940c5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
37792025-03-07T23:30:06.718ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "14099a36-eeef-4572-91fa-2323555940c5", "content-length": "3889", "date": "Fri, 07 Mar 2025 23:30:06 GMT"} })
37802025-03-07T23:30:06.720ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
37812025-03-07T23:30:06.720ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
37822025-03-07T23:30:06.720ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
37832025-03-07T23:30:06.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
37842025-03-07T23:30:06.723ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37852025-03-07T23:30:06.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37862025-03-07T23:30:06.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37872025-03-07T23:30:06.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37882025-03-07T23:30:06.727ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37892025-03-07T23:30:06.733ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
37902025-03-07T23:30:06.733ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
37912025-03-07T23:30:06.733ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
37922025-03-07T23:30:06.734ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
37932025-03-07T23:30:06.757ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
37942025-03-07T23:30:06.809ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
37952025-03-07T23:30:06.809ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37962025-03-07T23:30:06.809ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
37972025-03-07T23:30:06.809ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
37982025-03-07T23:30:06.811ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
37992025-03-07T23:30:06.817ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38002025-03-07T23:30:06.826ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
38012025-03-07T23:30:06.827ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38022025-03-07T23:30:06.827ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38032025-03-07T23:30:06.829ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38042025-03-07T23:30:07.010ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 140fb8dc-bff5-41b3-89b6-ec22074016af
38052025-03-07T23:30:07.010ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 140fb8dc-bff5-41b3-89b6-ec22074016af time_started = 2025-03-07 23:30:06.111103 UTC
38062025-03-07T23:30:07.010ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 1.211246088s iteration = 6 status = {"collection_id":"140fb8dc-bff5-41b3-89b6-ec22074016af","time_done":"2025-03-07 23:30:06.720846 UTC","time_started":"2025-03-07 23:30:06.111103 UTC"}
38072025-03-07T23:30:07.010ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 7 reason = Signaled
38082025-03-07T23:30:07.010ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
38092025-03-07T23:30:07.010ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38102025-03-07T23:30:07.010ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38112025-03-07T23:30:07.010ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38122025-03-07T23:30:07.011ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38132025-03-07T23:30:07.011ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 6 reason = Dependency
38142025-03-07T23:30:07.011ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 19.846\u{b5}s iteration = 6 status = {"error":"task disabled"}
38152025-03-07T23:30:07.011ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 6 reason = Dependency
38162025-03-07T23:30:07.011ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
38172025-03-07T23:30:07.011ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 18.075\u{b5}s iteration = 6 status = {"error":"no blueprint"}
38182025-03-07T23:30:07.013ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38192025-03-07T23:30:07.018ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
38202025-03-07T23:30:07.018ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38212025-03-07T23:30:07.018ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38222025-03-07T23:30:07.018ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38232025-03-07T23:30:07.020ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38242025-03-07T23:30:07.020ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38252025-03-07T23:30:07.020ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38262025-03-07T23:30:07.021ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: eligible for removal background_task = inventory_collection candidates = [(a6c0cac9-c7a2-4f07-9b0a-bbc68579b830, 0), (ec2a7056-c5d3-4008-b06b-369de20c1466, 0), (af63e68d-565b-4f56-b7f6-7258c4fae122, 0), (140fb8dc-bff5-41b3-89b6-ec22074016af, 0)] collection_id = a6c0cac9-c7a2-4f07-9b0a-bbc68579b830
38272025-03-07T23:30:07.021ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38282025-03-07T23:30:07.021ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38292025-03-07T23:30:07.022ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38302025-03-07T23:30:07.060ZINFOtest_unauthorized (BackgroundTasks): removed inventory collection background_task = inventory_collection collection_id = a6c0cac9-c7a2-4f07-9b0a-bbc68579b830 ncabooses = 24 nclickhouse_keeper_membership = 0 ncollections = 1 ndatasets = 0 nerrors = 0 nnics = 2 nnvme_disk_firmware = 0 nphysical_disks = 0 nrot_pages = 16 nrots = 4 nsled_agent_zones = 1 nsled_agents = 1 nsps = 4 nzones = 6 nzpools = 0
38312025-03-07T23:30:07.060ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
38322025-03-07T23:30:07.060ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
38332025-03-07T23:30:07.061ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
38342025-03-07T23:30:07.065ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
38352025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38362025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38372025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38382025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38392025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38402025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38412025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38422025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38432025-03-07T23:30:07.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63315 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
38442025-03-07T23:30:07.066ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:63315 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38452025-03-07T23:30:07.067ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:63315 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38462025-03-07T23:30:07.067ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:63315 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
38472025-03-07T23:30:07.067ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e serial = totally-unique-serial: fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
38482025-03-07T23:30:07.067ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38492025-03-07T23:30:07.067ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38502025-03-07T23:30:07.068ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38512025-03-07T23:30:07.068ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(ec2a7056-c5d3-4008-b06b-369de20c1466, 0), (af63e68d-565b-4f56-b7f6-7258c4fae122, 0), (140fb8dc-bff5-41b3-89b6-ec22074016af, 0)]
38522025-03-07T23:30:07.068ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
38532025-03-07T23:30:07.069ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 65 90 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 e............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:55926 req_id = 7917e19c-df94-4565-af82-2d8ca205ef93
38542025-03-07T23:30:07.069ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 26000,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55926 req_id = 7917e19c-df94-4565-af82-2d8ca205ef93
38552025-03-07T23:30:07.069ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
38562025-03-07T23:30:07.069ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
38572025-03-07T23:30:07.069ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:55926 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 7917e19c-df94-4565-af82-2d8ca205ef93
38582025-03-07T23:30:07.070ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3903, tv_nsec: 617295100 } })
38592025-03-07T23:30:07.070ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
38602025-03-07T23:30:07.071ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 8c eb 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:54644 req_id = 78b584c3-5a23-4361-945c-9acb7d71d31d
38612025-03-07T23:30:07.071ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 36075,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54644 req_id = 78b584c3-5a23-4361-945c-9acb7d71d31d
38622025-03-07T23:30:07.071ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
38632025-03-07T23:30:07.071ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:54644 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 78b584c3-5a23-4361-945c-9acb7d71d31d
38642025-03-07T23:30:07.203ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
38652025-03-07T23:30:07.203ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38662025-03-07T23:30:07.204ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38672025-03-07T23:30:07.204ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38682025-03-07T23:30:07.205ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
38692025-03-07T23:30:07.205ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
38702025-03-07T23:30:07.205ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
38712025-03-07T23:30:07.208ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
38722025-03-07T23:30:07.208ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
38732025-03-07T23:30:07.210ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
38742025-03-07T23:30:07.210ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38752025-03-07T23:30:07.210ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38762025-03-07T23:30:07.210ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38772025-03-07T23:30:07.211ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38782025-03-07T23:30:07.213ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
38792025-03-07T23:30:07.213ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:30:07.207991400Z } timeseries_name = integration_target:integration_metric
38802025-03-07T23:30:07.213ZDEBGtest_unauthorized (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
38812025-03-07T23:30:07.213ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
38822025-03-07T23:30:07.214ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: d7 f5 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:52788 req_id = a55025b4-06e0-4d9d-99bb-39ae49f6d0fa
38832025-03-07T23:30:07.215ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 55285,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52788 req_id = a55025b4-06e0-4d9d-99bb-39ae49f6d0fa
38842025-03-07T23:30:07.215ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
38852025-03-07T23:30:07.215ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 55285, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:52788 req_id = a55025b4-06e0-4d9d-99bb-39ae49f6d0fa
38862025-03-07T23:30:07.222ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
38872025-03-07T23:30:07.222ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
38882025-03-07T23:30:07.223ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
38892025-03-07T23:30:07.224ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
38902025-03-07T23:30:07.229ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
38912025-03-07T23:30:07.234ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
38922025-03-07T23:30:07.254ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f
38932025-03-07T23:30:07.254ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38942025-03-07T23:30:07.254ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
38952025-03-07T23:30:07.256ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
38962025-03-07T23:30:07.260ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
38972025-03-07T23:30:07.261ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38982025-03-07T23:30:07.261ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
38992025-03-07T23:30:07.261ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39002025-03-07T23:30:07.262ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39012025-03-07T23:30:07.263ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
39022025-03-07T23:30:07.263ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
39032025-03-07T23:30:07.267ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
39042025-03-07T23:30:07.267ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
39052025-03-07T23:30:07.269ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39062025-03-07T23:30:07.275ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
39072025-03-07T23:30:07.276ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "cab4e877-d22d-44e7-ab90-258203f5a1e2", "content-length": "835", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39082025-03-07T23:30:07.276ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
39092025-03-07T23:30:07.279ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "807aba05-3e4b-4891-9b02-383001980241", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39102025-03-07T23:30:07.279ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
39112025-03-07T23:30:07.282ZINFOtest_unauthorized (nexus): upserting Crucible dataset dataset_id = c72dc617-1d95-43e9-a071-ee0a42863c38 zpool_id = 3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f
39122025-03-07T23:30:07.286ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "98bb30e4-ce75-4f79-a39c-cf2c08f5e6e9", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39132025-03-07T23:30:07.286ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
39142025-03-07T23:30:07.289ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "75c36d1a-60d2-4b44-86a1-98f33dd93141", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39152025-03-07T23:30:07.290ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
39162025-03-07T23:30:07.291ZINFOtest_unauthorized (nexus): inserting test physical disk model = test-model physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e serial = totally-unique-serial: fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
39172025-03-07T23:30:07.291ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39182025-03-07T23:30:07.291ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39192025-03-07T23:30:07.292ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39202025-03-07T23:30:07.296ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "994f325c-45fb-4561-b7c3-e16648bd4092", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39212025-03-07T23:30:07.296ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
39222025-03-07T23:30:07.297ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = PhysicalDisk { parent: Fleet, key: fbf4e1f1-410e-4314-bff1-fec0504be07e (physical_disk), lookup_type: ById(fbf4e1f1-410e-4314-bff1-fec0504be07e) }
39232025-03-07T23:30:07.297ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39242025-03-07T23:30:07.297ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39252025-03-07T23:30:07.297ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39262025-03-07T23:30:07.298ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39272025-03-07T23:30:07.300ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39282025-03-07T23:30:07.306ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = PhysicalDisk { parent: Fleet, key: fbf4e1f1-410e-4314-bff1-fec0504be07e (physical_disk), lookup_type: ById(fbf4e1f1-410e-4314-bff1-fec0504be07e) } result = Ok(())
39292025-03-07T23:30:07.306ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = fbf4e1f1-410e-4314-bff1-fec0504be07e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f
39302025-03-07T23:30:07.306ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39312025-03-07T23:30:07.306ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39322025-03-07T23:30:07.307ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39332025-03-07T23:30:07.308ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
39342025-03-07T23:30:07.309ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a11a7a61-9eb9-44ff-b25e-fd806cd01555", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39352025-03-07T23:30:07.309ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
39362025-03-07T23:30:07.310ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
39372025-03-07T23:30:07.310ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39382025-03-07T23:30:07.310ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39392025-03-07T23:30:07.310ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39402025-03-07T23:30:07.310ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39412025-03-07T23:30:07.313ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39422025-03-07T23:30:07.315ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
39432025-03-07T23:30:07.317ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6009da42-844f-4cc7-bd46-cc2c09962a83", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39442025-03-07T23:30:07.317ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
39452025-03-07T23:30:07.320ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed378ad8-87be-4f82-860f-14758e425e48", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39462025-03-07T23:30:07.320ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
39472025-03-07T23:30:07.323ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
39482025-03-07T23:30:07.323ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39492025-03-07T23:30:07.323ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39502025-03-07T23:30:07.323ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39512025-03-07T23:30:07.324ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39522025-03-07T23:30:07.326ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8e6e022b-ed29-4f50-988e-fbef249b73fc", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39532025-03-07T23:30:07.326ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
39542025-03-07T23:30:07.327ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39552025-03-07T23:30:07.330ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
39562025-03-07T23:30:07.331ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39572025-03-07T23:30:07.331ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39582025-03-07T23:30:07.331ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39592025-03-07T23:30:07.334ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d554455e-e724-4bdc-96a4-5068d74e0e7a", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39602025-03-07T23:30:07.334ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
39612025-03-07T23:30:07.335ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "49b9f391-240c-4244-8634-cf5ed8039df4", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39622025-03-07T23:30:07.335ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
39632025-03-07T23:30:07.337ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a04727d1-6613-46fa-beca-26f0439a1c0f", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39642025-03-07T23:30:07.337ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
39652025-03-07T23:30:07.339ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
39662025-03-07T23:30:07.339ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39672025-03-07T23:30:07.339ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39682025-03-07T23:30:07.339ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39692025-03-07T23:30:07.340ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39702025-03-07T23:30:07.340ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6707c42b-53d1-4505-99c0-4c5e6f513ddd", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39712025-03-07T23:30:07.340ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
39722025-03-07T23:30:07.345ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39732025-03-07T23:30:07.354ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
39742025-03-07T23:30:07.354ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39752025-03-07T23:30:07.354ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39762025-03-07T23:30:07.354ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39772025-03-07T23:30:07.361ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
39782025-03-07T23:30:07.361ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
39792025-03-07T23:30:07.364ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
39802025-03-07T23:30:07.365ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0bd702d5-24f7-433c-9c51-c6d102bfa468", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39812025-03-07T23:30:07.365ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
39822025-03-07T23:30:07.370ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "617288e0-bfa3-4216-8c87-f6dc966429bd", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39832025-03-07T23:30:07.370ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
39842025-03-07T23:30:07.375ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a000fcce-74c7-47c4-a3cd-c5e6eee9f005", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39852025-03-07T23:30:07.376ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
39862025-03-07T23:30:07.382ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9de52ad5-bb9a-475a-9afa-1cd22c09e751", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39872025-03-07T23:30:07.383ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
39882025-03-07T23:30:07.395ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "53d07042-0568-4a6b-bbe1-31068b56c83a", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39892025-03-07T23:30:07.396ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
39902025-03-07T23:30:07.404ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "559576e8-f55c-4a07-8779-4de5eb7cbbd9", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39912025-03-07T23:30:07.405ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
39922025-03-07T23:30:07.405ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
39932025-03-07T23:30:07.407ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "00d84656-4a23-427c-94fc-287e314e1334", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39942025-03-07T23:30:07.407ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
39952025-03-07T23:30:07.408ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aa4ecbfc-793f-43fc-8249-c64242dcb418", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39962025-03-07T23:30:07.408ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
39972025-03-07T23:30:07.409ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a3e271e3-f210-4b66-8cdf-be2ad269abb7", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
39982025-03-07T23:30:07.409ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
39992025-03-07T23:30:07.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
40002025-03-07T23:30:07.411ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40012025-03-07T23:30:07.411ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10767f46-fd2d-4d3e-85ec-52a80d8b9fdc uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40022025-03-07T23:30:07.411ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10767f46-fd2d-4d3e-85ec-52a80d8b9fdc resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40032025-03-07T23:30:07.411ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10767f46-fd2d-4d3e-85ec-52a80d8b9fdc roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40042025-03-07T23:30:07.412ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10767f46-fd2d-4d3e-85ec-52a80d8b9fdc resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40052025-03-07T23:30:07.413ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a29a4270-b590-43ba-9e6f-99aa27293ea8", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40062025-03-07T23:30:07.413ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
40072025-03-07T23:30:07.415ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c61ad7b7-3139-4a13-8d10-4229299ff61c", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40082025-03-07T23:30:07.416ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
40092025-03-07T23:30:07.418ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7657 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10767f46-fd2d-4d3e-85ec-52a80d8b9fdc response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
40102025-03-07T23:30:07.419ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "10767f46-fd2d-4d3e-85ec-52a80d8b9fdc", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40112025-03-07T23:30:07.419ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40122025-03-07T23:30:07.419ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 569588b0-84dd-4577-b615-23f48551e11f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40132025-03-07T23:30:07.420ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 569588b0-84dd-4577-b615-23f48551e11f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40142025-03-07T23:30:07.420ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 569588b0-84dd-4577-b615-23f48551e11f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40152025-03-07T23:30:07.421ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 569588b0-84dd-4577-b615-23f48551e11f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40162025-03-07T23:30:07.423ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6bb64b0b-6150-47f6-b931-f8ebe6b78aa5", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40172025-03-07T23:30:07.423ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
40182025-03-07T23:30:07.424ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4838 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 569588b0-84dd-4577-b615-23f48551e11f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
40192025-03-07T23:30:07.425ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "569588b0-84dd-4577-b615-23f48551e11f", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40202025-03-07T23:30:07.425ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
40212025-03-07T23:30:07.425ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40222025-03-07T23:30:07.425ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
40232025-03-07T23:30:07.427ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3da76ebc-0bed-4381-a730-9efd5638980c", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40242025-03-07T23:30:07.427ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
40252025-03-07T23:30:07.431ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "caab4ac7-cf12-4695-b0da-eceb94113b26", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40262025-03-07T23:30:07.431ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
40272025-03-07T23:30:07.433ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9db78b40-d341-47f9-973b-8c78a5df556a", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40282025-03-07T23:30:07.433ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
40292025-03-07T23:30:07.437ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f4f7580-220a-4194-932f-7dc1a1c72608", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40302025-03-07T23:30:07.437ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
40312025-03-07T23:30:07.440ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9aa1b181-919b-4a5b-8e44-a5f47f1cfb4c", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40322025-03-07T23:30:07.440ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
40332025-03-07T23:30:07.443ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "93329e6a-bac9-4f4f-9e18-430801c7734b", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40342025-03-07T23:30:07.443ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
40352025-03-07T23:30:07.446ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ba7aab93-00a9-459b-bfaf-897b338149f1", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40362025-03-07T23:30:07.446ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
40372025-03-07T23:30:07.448ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f1a9000c-a4c8-4ddf-b0e8-aaf074d387fa", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40382025-03-07T23:30:07.448ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
40392025-03-07T23:30:07.448ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "abbe4d6c-5705-4143-a70a-58a2b3ad9c7b", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40402025-03-07T23:30:07.448ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
40412025-03-07T23:30:07.449ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d06f7d66-e87a-4296-ab90-572f55c62d18", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40422025-03-07T23:30:07.450ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
40432025-03-07T23:30:07.451ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "011fe161-8bf6-42ab-8b57-595a9b0eddfd", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40442025-03-07T23:30:07.452ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
40452025-03-07T23:30:07.458ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
40462025-03-07T23:30:07.458ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40472025-03-07T23:30:07.458ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
40482025-03-07T23:30:07.458ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
40492025-03-07T23:30:07.459ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
40502025-03-07T23:30:07.461ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0e92ae40-abb7-4e22-973c-c452dcf5008d", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40512025-03-07T23:30:07.461ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
40522025-03-07T23:30:07.463ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3bdb1b72-85f3-435f-852a-0db3f4a6f75c", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40532025-03-07T23:30:07.463ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
40542025-03-07T23:30:07.463ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40552025-03-07T23:30:07.470ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
40562025-03-07T23:30:07.470ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
40572025-03-07T23:30:07.470ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
40582025-03-07T23:30:07.471ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
40592025-03-07T23:30:07.473ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
40602025-03-07T23:30:07.473ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
40612025-03-07T23:30:07.474ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
40622025-03-07T23:30:07.476ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "385fad88-6366-43ca-a32f-b2ff81e481db", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40632025-03-07T23:30:07.476ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
40642025-03-07T23:30:07.478ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c859769b-3cfa-4371-b1c9-ac3682bd68d9", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40652025-03-07T23:30:07.478ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
40662025-03-07T23:30:07.481ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1ce0e86-1c53-40c2-a065-8030a40fc561", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40672025-03-07T23:30:07.482ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
40682025-03-07T23:30:07.483ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4e99a73-a08b-4a39-b588-7b8927692f7b", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40692025-03-07T23:30:07.483ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
40702025-03-07T23:30:07.484ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "835e67a0-60b0-456c-b0db-c9eb99097f6e", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40712025-03-07T23:30:07.484ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
40722025-03-07T23:30:07.486ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aab642dc-a6d1-4fbf-be7d-db55693f36ac", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40732025-03-07T23:30:07.486ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
40742025-03-07T23:30:07.487ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "66522dd2-a48a-4358-be98-e146e4fe0f59", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
40752025-03-07T23:30:07.487ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
40762025-03-07T23:30:07.487ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40772025-03-07T23:30:07.487ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
40782025-03-07T23:30:07.487ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
40792025-03-07T23:30:07.488ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
40802025-03-07T23:30:07.493ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40812025-03-07T23:30:07.499ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
40822025-03-07T23:30:07.499ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
40832025-03-07T23:30:07.499ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40842025-03-07T23:30:07.499ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
40852025-03-07T23:30:07.500ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
40862025-03-07T23:30:07.500ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
40872025-03-07T23:30:07.503ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40882025-03-07T23:30:07.508ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
40892025-03-07T23:30:07.508ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
40902025-03-07T23:30:07.508ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
40912025-03-07T23:30:07.509ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
40922025-03-07T23:30:07.649ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
40932025-03-07T23:30:07.649ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
40942025-03-07T23:30:07.651ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:36301 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
40952025-03-07T23:30:07.652ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40962025-03-07T23:30:07.652ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40972025-03-07T23:30:07.652ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:36301 req_id = 22c0dae5-1e47-4038-81db-f2b1cc5b10e8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
40982025-03-07T23:30:07.655ZINFOtest_unauthorized (dropshot): request completed latency_us = 2430 local_addr = [::1]:57532 method = GET remote_addr = [::1]:36301 req_id = 22c0dae5-1e47-4038-81db-f2b1cc5b10e8 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
40992025-03-07T23:30:07.655ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
41002025-03-07T23:30:07.655ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
41012025-03-07T23:30:07.666ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
41022025-03-07T23:30:07.666ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
41032025-03-07T23:30:07.666ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
41042025-03-07T23:30:07.666ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "22c0dae5-1e47-4038-81db-f2b1cc5b10e8", "content-length": "4263", "date": "Fri, 07 Mar 2025 23:30:07 GMT"} })
41052025-03-07T23:30:07.668ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
41062025-03-07T23:30:07.668ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
41072025-03-07T23:30:07.668ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
41082025-03-07T23:30:07.671ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
41092025-03-07T23:30:07.671ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41102025-03-07T23:30:07.671ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41112025-03-07T23:30:07.671ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41122025-03-07T23:30:07.672ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41132025-03-07T23:30:07.682ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
41142025-03-07T23:30:07.695ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
41152025-03-07T23:30:07.698ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41162025-03-07T23:30:07.698ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41172025-03-07T23:30:07.698ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41182025-03-07T23:30:07.710ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
41192025-03-07T23:30:07.711ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41202025-03-07T23:30:07.711ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
41212025-03-07T23:30:07.711ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
41222025-03-07T23:30:07.712ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
41232025-03-07T23:30:07.717ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
41242025-03-07T23:30:07.729ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
41252025-03-07T23:30:07.729ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
41262025-03-07T23:30:07.729ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
41272025-03-07T23:30:07.730ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
41282025-03-07T23:30:07.996ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 4f78d182-3633-4560-8739-c47c9f7d4319
41292025-03-07T23:30:07.997ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 4f78d182-3633-4560-8739-c47c9f7d4319 time_started = 2025-03-07 23:30:07.222370 UTC
41302025-03-07T23:30:07.997ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 986.789972ms iteration = 7 status = {"collection_id":"4f78d182-3633-4560-8739-c47c9f7d4319","time_done":"2025-03-07 23:30:07.668838 UTC","time_started":"2025-03-07 23:30:07.222370 UTC"}
41312025-03-07T23:30:07.997ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 8 reason = Signaled
41322025-03-07T23:30:07.997ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
41332025-03-07T23:30:07.997ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
41342025-03-07T23:30:07.997ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41352025-03-07T23:30:07.997ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41362025-03-07T23:30:07.998ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41372025-03-07T23:30:07.998ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 7 reason = Dependency
41382025-03-07T23:30:07.998ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
41392025-03-07T23:30:07.998ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 25.467\u{b5}s iteration = 7 status = {"error":"no blueprint"}
41402025-03-07T23:30:07.998ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 7 reason = Dependency
41412025-03-07T23:30:07.998ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 10.032\u{b5}s iteration = 7 status = {"error":"task disabled"}
41422025-03-07T23:30:08.000ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
41432025-03-07T23:30:08.010ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
41442025-03-07T23:30:08.010ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41452025-03-07T23:30:08.010ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41462025-03-07T23:30:08.010ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41472025-03-07T23:30:08.011ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
41482025-03-07T23:30:08.011ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
41492025-03-07T23:30:08.011ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
41502025-03-07T23:30:08.014ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: eligible for removal background_task = inventory_collection candidates = [(ec2a7056-c5d3-4008-b06b-369de20c1466, 0), (af63e68d-565b-4f56-b7f6-7258c4fae122, 0), (140fb8dc-bff5-41b3-89b6-ec22074016af, 0), (4f78d182-3633-4560-8739-c47c9f7d4319, 0)] collection_id = ec2a7056-c5d3-4008-b06b-369de20c1466
41512025-03-07T23:30:08.028ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41522025-03-07T23:30:08.028ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41532025-03-07T23:30:08.028ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41542025-03-07T23:30:08.073ZINFOtest_unauthorized (BackgroundTasks): removed inventory collection background_task = inventory_collection collection_id = ec2a7056-c5d3-4008-b06b-369de20c1466 ncabooses = 24 nclickhouse_keeper_membership = 0 ncollections = 1 ndatasets = 0 nerrors = 0 nnics = 2 nnvme_disk_firmware = 1 nphysical_disks = 1 nrot_pages = 16 nrots = 4 nsled_agent_zones = 1 nsled_agents = 1 nsps = 4 nzones = 6 nzpools = 1
41552025-03-07T23:30:08.073ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
41562025-03-07T23:30:08.073ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
41572025-03-07T23:30:08.074ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
41582025-03-07T23:30:08.083ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(af63e68d-565b-4f56-b7f6-7258c4fae122, 0), (140fb8dc-bff5-41b3-89b6-ec22074016af, 0), (4f78d182-3633-4560-8739-c47c9f7d4319, 0)]
41592025-03-07T23:30:08.083ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
41602025-03-07T23:30:08.085ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 50 94 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 P............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:49331 req_id = d3c037e0-c7e1-46d2-985e-97e86c3b787c
41612025-03-07T23:30:08.085ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 20628,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:49331 req_id = d3c037e0-c7e1-46d2-985e-97e86c3b787c
41622025-03-07T23:30:08.085ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
41632025-03-07T23:30:08.085ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
41642025-03-07T23:30:08.085ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:49331 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = d3c037e0-c7e1-46d2-985e-97e86c3b787c
41652025-03-07T23:30:08.086ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39609, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3904, tv_nsec: 633021581 } })
41662025-03-07T23:30:08.086ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
41672025-03-07T23:30:08.086ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 82 e2 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:51860 req_id = 8488646c-a5a4-420b-8117-a7989333bfc1
41682025-03-07T23:30:08.086ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 33506,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51860 req_id = 8488646c-a5a4-420b-8117-a7989333bfc1
41692025-03-07T23:30:08.086ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
41702025-03-07T23:30:08.086ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:51860 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 8488646c-a5a4-420b-8117-a7989333bfc1
41712025-03-07T23:30:08.232ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
41722025-03-07T23:30:08.246ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
41732025-03-07T23:30:08.246ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
41742025-03-07T23:30:08.246ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
41752025-03-07T23:30:08.248ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
41762025-03-07T23:30:08.250ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Ok("found")
41772025-03-07T23:30:08.252ZINFOtest_unauthorized: setting up resource hierarchy
41782025-03-07T23:30:08.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos
41792025-03-07T23:30:08.257ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 14 9f 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:53407 req_id = 2985348d-4fb3-4bcf-a9c1-ac5d2858b165
41802025-03-07T23:30:08.257ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 5279,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53407 req_id = 2985348d-4fb3-4bcf-a9c1-ac5d2858b165
41812025-03-07T23:30:08.259ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
41822025-03-07T23:30:08.260ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 5279, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:53407 req_id = 2985348d-4fb3-4bcf-a9c1-ac5d2858b165
41832025-03-07T23:30:08.262ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:48685 remote_addr = 127.0.0.1:59739
41842025-03-07T23:30:08.275ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
41852025-03-07T23:30:08.276ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39609
41862025-03-07T23:30:08.276ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/ignition
41872025-03-07T23:30:08.277ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 uri = /v1/system/silos
41882025-03-07T23:30:08.278ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 uri = /v1/system/silos
41892025-03-07T23:30:08.279ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos
41902025-03-07T23:30:08.279ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41912025-03-07T23:30:08.279ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41922025-03-07T23:30:08.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
41932025-03-07T23:30:08.281ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
41942025-03-07T23:30:08.281ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
41952025-03-07T23:30:08.282ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc14733c-e0e6-4e06-924f-9099545f3c7b", "content-length": "835", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
41962025-03-07T23:30:08.282ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0
41972025-03-07T23:30:08.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
41982025-03-07T23:30:08.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
41992025-03-07T23:30:08.297ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42002025-03-07T23:30:08.299ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
42012025-03-07T23:30:08.299ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
42022025-03-07T23:30:08.301ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3fb44ad1-36a7-4e5a-84a2-56e76d879b38", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42032025-03-07T23:30:08.301ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0
42042025-03-07T23:30:08.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
42052025-03-07T23:30:08.303ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
42062025-03-07T23:30:08.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42072025-03-07T23:30:08.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42082025-03-07T23:30:08.304ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42092025-03-07T23:30:08.305ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ea2195d2-1970-4de4-b1f2-31531511d8b3", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42102025-03-07T23:30:08.305ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1
42112025-03-07T23:30:08.305ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
42122025-03-07T23:30:08.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42132025-03-07T23:30:08.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42142025-03-07T23:30:08.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42152025-03-07T23:30:08.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
42162025-03-07T23:30:08.311ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
42172025-03-07T23:30:08.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42182025-03-07T23:30:08.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42192025-03-07T23:30:08.312ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42202025-03-07T23:30:08.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
42212025-03-07T23:30:08.314ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
42222025-03-07T23:30:08.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42232025-03-07T23:30:08.314ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42242025-03-07T23:30:08.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42252025-03-07T23:30:08.315ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8cb213d1-a1ca-498b-8cb9-1b26049660f0", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42262025-03-07T23:30:08.315ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0
42272025-03-07T23:30:08.316ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
42282025-03-07T23:30:08.317ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42292025-03-07T23:30:08.317ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42302025-03-07T23:30:08.317ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42312025-03-07T23:30:08.336ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
42322025-03-07T23:30:08.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
42332025-03-07T23:30:08.339ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 uri = /v1/system/silos
42342025-03-07T23:30:08.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42352025-03-07T23:30:08.339ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42362025-03-07T23:30:08.340ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42372025-03-07T23:30:08.341ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9412b66e-489e-4c7f-949f-582b56d8ecf6", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42382025-03-07T23:30:08.342ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1
42392025-03-07T23:30:08.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
42402025-03-07T23:30:08.342ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
42412025-03-07T23:30:08.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42422025-03-07T23:30:08.342ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42432025-03-07T23:30:08.343ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
42442025-03-07T23:30:08.351ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
42452025-03-07T23:30:08.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
42462025-03-07T23:30:08.356ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
42472025-03-07T23:30:08.359ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = BlueprintConfig uri = /v1/system/silos
42482025-03-07T23:30:08.359ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
42492025-03-07T23:30:08.359ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database uri = /v1/system/silos
42502025-03-07T23:30:08.359ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {} } uri = /v1/system/silos
42512025-03-07T23:30:08.360ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database result = Ok(()) uri = /v1/system/silos
42522025-03-07T23:30:08.369ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
42532025-03-07T23:30:08.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = BlueprintConfig result = Ok(()) uri = /v1/system/silos
42542025-03-07T23:30:08.382ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database uri = /v1/system/silos
42552025-03-07T23:30:08.382ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {} } uri = /v1/system/silos
42562025-03-07T23:30:08.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database result = Ok(()) uri = /v1/system/silos
42572025-03-07T23:30:08.383ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "918d94b3-7905-4a22-9531-72ea5fd16bac", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42582025-03-07T23:30:08.383ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0
42592025-03-07T23:30:08.385ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Blueprint { parent: Fleet, key: d650e231-b16e-4852-836f-d1272975761d, lookup_type: ById(d650e231-b16e-4852-836f-d1272975761d) } uri = /v1/system/silos
42602025-03-07T23:30:08.385ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
42612025-03-07T23:30:08.385ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database uri = /v1/system/silos
42622025-03-07T23:30:08.385ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {} } uri = /v1/system/silos
42632025-03-07T23:30:08.386ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database result = Ok(()) uri = /v1/system/silos
42642025-03-07T23:30:08.392ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
42652025-03-07T23:30:08.401ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Blueprint { parent: Fleet, key: d650e231-b16e-4852-836f-d1272975761d, lookup_type: ById(d650e231-b16e-4852-836f-d1272975761d) } result = Ok(()) uri = /v1/system/silos
42662025-03-07T23:30:08.401ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database uri = /v1/system/silos
42672025-03-07T23:30:08.401ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {} } uri = /v1/system/silos
42682025-03-07T23:30:08.403ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database result = Ok(()) uri = /v1/system/silos
42692025-03-07T23:30:08.404ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d7088cea-bc63-4e45-a28c-25ee7ac7c1ec", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42702025-03-07T23:30:08.405ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1
42712025-03-07T23:30:08.420ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "54940bd4-73e6-42d0-8226-66dbd43c8a17", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42722025-03-07T23:30:08.421ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cmpa
42732025-03-07T23:30:08.423ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "baea5a00-467f-414e-80ca-9035d18d8e49", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42742025-03-07T23:30:08.423ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
42752025-03-07T23:30:08.424ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f453975b-388b-4b1d-9121-e29f8297a161", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42762025-03-07T23:30:08.426ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
42772025-03-07T23:30:08.443ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6cb810e8-99b3-4134-b322-93aacbe725e7", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42782025-03-07T23:30:08.444ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/0/component/rot/cfpa
42792025-03-07T23:30:08.467ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8b94c1f6-948f-456e-a047-cb643824e979", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42802025-03-07T23:30:08.467ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1
42812025-03-07T23:30:08.468ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database uri = /v1/system/silos
42822025-03-07T23:30:08.469ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {} } uri = /v1/system/silos
42832025-03-07T23:30:08.469ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database result = Ok(()) uri = /v1/system/silos
42842025-03-07T23:30:08.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Fleet uri = /v1/system/silos
42852025-03-07T23:30:08.504ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
42862025-03-07T23:30:08.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database uri = /v1/system/silos
42872025-03-07T23:30:08.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {} } uri = /v1/system/silos
42882025-03-07T23:30:08.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Database result = Ok(()) uri = /v1/system/silos
42892025-03-07T23:30:08.506ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8c529c4e-6612-4174-9303-ade12a65042b", "content-length": "734", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
42902025-03-07T23:30:08.507ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0
42912025-03-07T23:30:08.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
42922025-03-07T23:30:08.520ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 resource = Fleet result = Ok(()) uri = /v1/system/silos
42932025-03-07T23:30:08.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42942025-03-07T23:30:08.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42952025-03-07T23:30:08.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
42962025-03-07T23:30:08.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
42972025-03-07T23:30:08.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
42982025-03-07T23:30:08.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
42992025-03-07T23:30:08.567ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43002025-03-07T23:30:08.575ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6124dbef-2981-4f70-bc58-b4baaa54bebc", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
43012025-03-07T23:30:08.575ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1
43022025-03-07T23:30:08.576ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
43032025-03-07T23:30:08.577ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
43042025-03-07T23:30:08.577ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
43052025-03-07T23:30:08.577ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
43062025-03-07T23:30:08.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43072025-03-07T23:30:08.583ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
43082025-03-07T23:30:08.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
43092025-03-07T23:30:08.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43102025-03-07T23:30:08.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43112025-03-07T23:30:08.584ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43122025-03-07T23:30:08.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43132025-03-07T23:30:08.596ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43142025-03-07T23:30:08.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
43152025-03-07T23:30:08.605ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
43162025-03-07T23:30:08.605ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43172025-03-07T23:30:08.605ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43182025-03-07T23:30:08.605ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43192025-03-07T23:30:08.606ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43202025-03-07T23:30:08.607ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4490f941-903c-4ef2-a914-2b979624daa0", "content-length": "111", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
43212025-03-07T23:30:08.607ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0
43222025-03-07T23:30:08.608ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
43232025-03-07T23:30:08.614ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
43242025-03-07T23:30:08.631ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "cf45eaca-8cf4-4f74-8c76-ff82f1253c21", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
43252025-03-07T23:30:08.633ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1
43262025-03-07T23:30:08.637ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4c387246-7314-426e-8c05-c58cd5848403", "content-length": "167", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
43272025-03-07T23:30:08.637ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0
43282025-03-07T23:30:08.638ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 3 reason = Signaled
43292025-03-07T23:30:08.638ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
43302025-03-07T23:30:08.638ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
43312025-03-07T23:30:08.638ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
43322025-03-07T23:30:08.638ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
43332025-03-07T23:30:08.639ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 3 reason = Signaled
43342025-03-07T23:30:08.639ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
43352025-03-07T23:30:08.639ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43362025-03-07T23:30:08.639ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
43372025-03-07T23:30:08.639ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
43382025-03-07T23:30:08.639ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
43392025-03-07T23:30:08.640ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 362261 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a6aac47-7996-4230-bdea-699b1eac31c9 response_code = 201 uri = /v1/system/silos
43402025-03-07T23:30:08.641ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
43412025-03-07T23:30:08.641ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43422025-03-07T23:30:08.641ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
43432025-03-07T23:30:08.641ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
43442025-03-07T23:30:08.641ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
43452025-03-07T23:30:08.642ZINFOtest_unauthorized (external client test context): client received response status = 201
43462025-03-07T23:30:08.642ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
43472025-03-07T23:30:08.644ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc uri = /v1/system/identity-providers/local/users?silo=default-silo
43482025-03-07T23:30:08.644ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc uri = /v1/system/identity-providers/local/users?silo=default-silo
43492025-03-07T23:30:08.644ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/identity-providers/local/users?silo=default-silo
43502025-03-07T23:30:08.644ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43512025-03-07T23:30:08.644ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43522025-03-07T23:30:08.645ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43532025-03-07T23:30:08.645ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43542025-03-07T23:30:08.650ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
43552025-03-07T23:30:08.650ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
43562025-03-07T23:30:08.650ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
43572025-03-07T23:30:08.650ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
43582025-03-07T23:30:08.650ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43592025-03-07T23:30:08.657ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
43602025-03-07T23:30:08.670ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 3
43612025-03-07T23:30:08.670ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
43622025-03-07T23:30:08.670ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
43632025-03-07T23:30:08.670ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
43642025-03-07T23:30:08.671ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43652025-03-07T23:30:08.671ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
43662025-03-07T23:30:08.671ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
43672025-03-07T23:30:08.672ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
43682025-03-07T23:30:08.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43692025-03-07T23:30:08.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43702025-03-07T23:30:08.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43712025-03-07T23:30:08.680ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
43722025-03-07T23:30:08.680ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43732025-03-07T23:30:08.680ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
43742025-03-07T23:30:08.680ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
43752025-03-07T23:30:08.681ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
43762025-03-07T23:30:08.686ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43772025-03-07T23:30:08.694ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
43782025-03-07T23:30:08.694ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
43792025-03-07T23:30:08.695ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
43802025-03-07T23:30:08.695ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
43812025-03-07T23:30:08.699ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43822025-03-07T23:30:08.708ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
43832025-03-07T23:30:08.708ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
43842025-03-07T23:30:08.708ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
43852025-03-07T23:30:08.709ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
43862025-03-07T23:30:08.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
43872025-03-07T23:30:08.709ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
43882025-03-07T23:30:08.710ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
43892025-03-07T23:30:08.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
43902025-03-07T23:30:08.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
43912025-03-07T23:30:08.727ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
43922025-03-07T23:30:08.727ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 1c466382-26d9-4eba-a972-8bc97483988b dns_zone_name = oxide-dev.test found_so_far = 0 version = 3
43932025-03-07T23:30:08.727ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
43942025-03-07T23:30:08.727ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43952025-03-07T23:30:08.727ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
43962025-03-07T23:30:08.728ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
43972025-03-07T23:30:08.728ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
43982025-03-07T23:30:08.729ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
43992025-03-07T23:30:08.729ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44002025-03-07T23:30:08.730ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44012025-03-07T23:30:08.730ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44022025-03-07T23:30:08.730ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44032025-03-07T23:30:08.730ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44042025-03-07T23:30:08.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44052025-03-07T23:30:08.731ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44062025-03-07T23:30:08.731ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44072025-03-07T23:30:08.734ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44082025-03-07T23:30:08.741ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
44092025-03-07T23:30:08.741ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
44102025-03-07T23:30:08.741ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
44112025-03-07T23:30:08.742ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
44122025-03-07T23:30:08.743ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
44132025-03-07T23:30:08.746ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
44142025-03-07T23:30:08.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44152025-03-07T23:30:08.746ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44162025-03-07T23:30:08.747ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44172025-03-07T23:30:08.748ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
44182025-03-07T23:30:08.752ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
44192025-03-07T23:30:08.752ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
44202025-03-07T23:30:08.752ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
44212025-03-07T23:30:08.752ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
44222025-03-07T23:30:08.755ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 1c466382-26d9-4eba-a972-8bc97483988b dns_zone_name = oxide-dev.test found_so_far = 2 version = 3
44232025-03-07T23:30:08.755ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 3
44242025-03-07T23:30:08.755ZINFOtest_unauthorized (BackgroundTasks): found latest DNS generation (newer than we had) background_task = dns_config_external current_generation = 2 current_time_created = 2025-03-07 23:29:57.861688 UTC dns_group = external generation = 3 old_generation = 2 old_time_created = 2025-03-07 23:29:57.861688 UTC time_created = 2025-03-07 23:30:08.615505 UTC
44252025-03-07T23:30:08.755ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 117.906164ms iteration = 3 status = {"generation":3}
44262025-03-07T23:30:08.756ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 4 reason = Dependency
44272025-03-07T23:30:08.824ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:39729 generation = 3 method = PUT servers = DnsServersList { addresses: [[::1]:39729] } uri = http://[::1]:39729/config
44282025-03-07T23:30:08.825ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
44292025-03-07T23:30:08.825ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
44302025-03-07T23:30:08.825ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44312025-03-07T23:30:08.825ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44322025-03-07T23:30:08.826ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44332025-03-07T23:30:08.828ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (changed) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:29:51.209697Z, time_modified: 2025-03-07T23:29:51.209697Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "demo-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, db_silo: Silo { identity: SiloIdentity { id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, name: Name(Name("demo-silo")), description: "", time_created: 2025-03-07T23:30:08.504234Z, time_modified: 2025-03-07T23:30:08.504234Z, time_deleted: None }, discoverable: true, authentication_mode: Saml, user_provision_type: Jit, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, dns_name: "demo-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
44342025-03-07T23:30:08.828ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 189.500186ms iteration = 3 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"demo-silo.sys.oxide-dev.test":{"silo_id":"3eb64c19-f07d-4328-aa21-1cd58fef44c0","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]}},"default_endpoint":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 3eb64c19-f07d-4328-aa21-1cd58fef44c0 with DNS name \\"demo-silo.sys.oxide-dev.test\\" has no usable certificates","silo 639f343f-2784-45fa-9934-45010d5cb460 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
44352025-03-07T23:30:08.830ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:39729 remote_addr = [::1]:53867
44362025-03-07T23:30:08.830ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
44372025-03-07T23:30:08.830ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
44382025-03-07T23:30:08.831ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
44392025-03-07T23:30:08.831ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
44402025-03-07T23:30:08.833ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:39729 method = PUT remote_addr = [::1]:53867 req_id = 72ed4720-d7ce-43ff-af0c-e4bb08e0dca8 uri = /config
44412025-03-07T23:30:08.870ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "52727bb8-8001-485e-bfd4-ce975987c889", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
44422025-03-07T23:30:08.871ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1
44432025-03-07T23:30:08.871ZINFOtest_unauthorized (store): attempting generation update new_generation = 3 req_id = 72ed4720-d7ce-43ff-af0c-e4bb08e0dca8
44442025-03-07T23:30:08.871ZINFOtest_unauthorized (store): pruning trees for generations newer than 2
44452025-03-07T23:30:08.871ZDEBGtest_unauthorized (store): creating tree tree_name = generation_3_zone_oxide-dev.test
44462025-03-07T23:30:08.872ZDEBGtest_unauthorized (store): updating current config
44472025-03-07T23:30:08.872ZDEBGtest_unauthorized (store): flushing default tree
44482025-03-07T23:30:08.872ZINFOtest_unauthorized (store): pruning trees for generations older than 3 keep = 3
44492025-03-07T23:30:08.872ZINFOtest_unauthorized (store): updated generation new_generation = 3 req_id = 72ed4720-d7ce-43ff-af0c-e4bb08e0dca8
44502025-03-07T23:30:08.873ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 40062 local_addr = [::1]:39729 method = PUT remote_addr = [::1]:53867 req_id = 72ed4720-d7ce-43ff-af0c-e4bb08e0dca8 response_code = 204 uri = /config
44512025-03-07T23:30:08.875ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:39729 generation = 3 result = Ok(Response { url: "http://[::1]:39729/config", status: 204, headers: {"x-request-id": "72ed4720-d7ce-43ff-af0c-e4bb08e0dca8", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} }) servers = DnsServersList { addresses: [[::1]:39729] }
44522025-03-07T23:30:08.875ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 3 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:39729 generation = 3 servers = DnsServersList { addresses: [[::1]:39729] }
44532025-03-07T23:30:08.876ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 3 servers = DnsServersList { addresses: [[::1]:39729] }
44542025-03-07T23:30:08.876ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 120.810399ms iteration = 4 status = {"generation":3,"server_results":{"[::1]:39729":{"Ok":null}}}
44552025-03-07T23:30:08.877ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
44562025-03-07T23:30:08.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
44572025-03-07T23:30:08.881ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc uri = /v1/system/identity-providers/local/users?silo=default-silo
44582025-03-07T23:30:08.881ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44592025-03-07T23:30:08.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44602025-03-07T23:30:08.882ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44612025-03-07T23:30:08.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users?silo=default-silo
44622025-03-07T23:30:08.922ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
44632025-03-07T23:30:08.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44642025-03-07T23:30:08.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44652025-03-07T23:30:08.923ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44662025-03-07T23:30:08.931ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
44672025-03-07T23:30:08.931ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44682025-03-07T23:30:08.932ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44692025-03-07T23:30:08.932ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44702025-03-07T23:30:08.951ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44712025-03-07T23:30:08.953ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44722025-03-07T23:30:08.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/identity-providers/local/users?silo=default-silo
44732025-03-07T23:30:08.953ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
44742025-03-07T23:30:08.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44752025-03-07T23:30:08.953ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44762025-03-07T23:30:08.954ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44772025-03-07T23:30:08.966ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
44782025-03-07T23:30:08.966ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44792025-03-07T23:30:08.966ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44802025-03-07T23:30:08.966ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44812025-03-07T23:30:08.972ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c2db1122-22eb-45df-9f8e-394caecc8fd2", "content-length": "175", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
44822025-03-07T23:30:08.973ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cmpa
44832025-03-07T23:30:08.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44842025-03-07T23:30:08.993ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44852025-03-07T23:30:08.993ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc897b63-b840-4d63-b290-7259bb289475", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
44862025-03-07T23:30:08.994ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
44872025-03-07T23:30:08.995ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "be1aa401-5612-434f-a243-8bcf093d9b78", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
44882025-03-07T23:30:08.995ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
44892025-03-07T23:30:08.996ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "56c64a7e-b522-4c7e-824e-2b5610d1791d", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
44902025-03-07T23:30:08.996ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/switch/1/component/rot/cfpa
44912025-03-07T23:30:08.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } uri = /v1/system/identity-providers/local/users?silo=default-silo
44922025-03-07T23:30:08.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
44932025-03-07T23:30:08.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44942025-03-07T23:30:08.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44952025-03-07T23:30:08.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
44962025-03-07T23:30:09.001ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
44972025-03-07T23:30:09.001ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
44982025-03-07T23:30:09.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
44992025-03-07T23:30:09.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45002025-03-07T23:30:09.003ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "72c312fc-5ab2-41db-bcbd-ed113a67b666", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45012025-03-07T23:30:09.003ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0
45022025-03-07T23:30:09.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45032025-03-07T23:30:09.013ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45042025-03-07T23:30:09.013ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
45052025-03-07T23:30:09.013ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
45062025-03-07T23:30:09.014ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
45072025-03-07T23:30:09.018ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 374007 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 415d063d-00a1-4e9f-b2eb-7b5b8682d8bc response_code = 201 uri = /v1/system/identity-providers/local/users?silo=default-silo
45082025-03-07T23:30:09.018ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0bcb2cc5-a1f7-4eea-8d0f-65da19da1f9b", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45092025-03-07T23:30:09.018ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0
45102025-03-07T23:30:09.019ZINFOtest_unauthorized (external client test context): client received response status = 201
45112025-03-07T23:30:09.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools
45122025-03-07T23:30:09.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b uri = /v1/system/ip-pools
45132025-03-07T23:30:09.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b uri = /v1/system/ip-pools
45142025-03-07T23:30:09.020ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
45152025-03-07T23:30:09.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45162025-03-07T23:30:09.021ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45172025-03-07T23:30:09.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45182025-03-07T23:30:09.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45192025-03-07T23:30:09.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45202025-03-07T23:30:09.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45212025-03-07T23:30:09.026ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "153efae3-d405-4306-bd41-33dc4d28d7a0", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45222025-03-07T23:30:09.027ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1
45232025-03-07T23:30:09.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
45242025-03-07T23:30:09.027ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45252025-03-07T23:30:09.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45262025-03-07T23:30:09.027ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45272025-03-07T23:30:09.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45282025-03-07T23:30:09.029ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45292025-03-07T23:30:09.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45302025-03-07T23:30:09.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45312025-03-07T23:30:09.030ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45322025-03-07T23:30:09.033ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45332025-03-07T23:30:09.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
45342025-03-07T23:30:09.036ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45352025-03-07T23:30:09.037ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45362025-03-07T23:30:09.037ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45372025-03-07T23:30:09.039ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "830a1b03-026c-4443-93ae-b83c0aab103c", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45382025-03-07T23:30:09.039ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0
45392025-03-07T23:30:09.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
45402025-03-07T23:30:09.040ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45412025-03-07T23:30:09.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45422025-03-07T23:30:09.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45432025-03-07T23:30:09.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45442025-03-07T23:30:09.043ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45452025-03-07T23:30:09.043ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45462025-03-07T23:30:09.043ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45472025-03-07T23:30:09.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45482025-03-07T23:30:09.046ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45492025-03-07T23:30:09.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
45502025-03-07T23:30:09.052ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b uri = /v1/system/ip-pools
45512025-03-07T23:30:09.052ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource = IpPoolList uri = /v1/system/ip-pools
45522025-03-07T23:30:09.052ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
45532025-03-07T23:30:09.052ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource = Database uri = /v1/system/ip-pools
45542025-03-07T23:30:09.052ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
45552025-03-07T23:30:09.053ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource = Database result = Ok(()) uri = /v1/system/ip-pools
45562025-03-07T23:30:09.054ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "632127da-4a54-415c-abce-7794dbf4f37c", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45572025-03-07T23:30:09.054ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1
45582025-03-07T23:30:09.061ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
45592025-03-07T23:30:09.069ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
45602025-03-07T23:30:09.069ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource = Database uri = /v1/system/ip-pools
45612025-03-07T23:30:09.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
45622025-03-07T23:30:09.070ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b resource = Database result = Ok(()) uri = /v1/system/ip-pools
45632025-03-07T23:30:09.074ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 54424 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 60326894-eaea-4f65-8dee-28a211b7c22b response_code = 201 uri = /v1/system/ip-pools
45642025-03-07T23:30:09.075ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2c7830cd-038d-4c85-b99b-b57fb95f6b14", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45652025-03-07T23:30:09.075ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0
45662025-03-07T23:30:09.076ZINFOtest_unauthorized (external client test context): client received response status = 201
45672025-03-07T23:30:09.076ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
45682025-03-07T23:30:09.077ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 uri = /v1/system/ip-pools/default/ranges/add
45692025-03-07T23:30:09.077ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 uri = /v1/system/ip-pools/default/ranges/add
45702025-03-07T23:30:09.077ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges/add
45712025-03-07T23:30:09.077ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45722025-03-07T23:30:09.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45732025-03-07T23:30:09.078ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45742025-03-07T23:30:09.080ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45752025-03-07T23:30:09.080ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45762025-03-07T23:30:09.081ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45772025-03-07T23:30:09.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
45782025-03-07T23:30:09.083ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45792025-03-07T23:30:09.083ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45802025-03-07T23:30:09.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45812025-03-07T23:30:09.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45822025-03-07T23:30:09.093ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45832025-03-07T23:30:09.093ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45842025-03-07T23:30:09.093ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45852025-03-07T23:30:09.100ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45862025-03-07T23:30:09.101ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d95040d8-696e-4689-9bf9-85b62d29a593", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
45872025-03-07T23:30:09.102ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1
45882025-03-07T23:30:09.103ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45892025-03-07T23:30:09.108ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
45902025-03-07T23:30:09.108ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45912025-03-07T23:30:09.109ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45922025-03-07T23:30:09.109ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45932025-03-07T23:30:09.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
45942025-03-07T23:30:09.126ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45952025-03-07T23:30:09.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
45962025-03-07T23:30:09.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
45972025-03-07T23:30:09.127ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
45982025-03-07T23:30:09.129ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45992025-03-07T23:30:09.129ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46002025-03-07T23:30:09.129ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46012025-03-07T23:30:09.130ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46022025-03-07T23:30:09.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46032025-03-07T23:30:09.149ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
46042025-03-07T23:30:09.149ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 uri = /v1/system/ip-pools/default/ranges/add
46052025-03-07T23:30:09.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46062025-03-07T23:30:09.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46072025-03-07T23:30:09.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46082025-03-07T23:30:09.155ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
46092025-03-07T23:30:09.155ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
46102025-03-07T23:30:09.155ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46112025-03-07T23:30:09.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46122025-03-07T23:30:09.155ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46132025-03-07T23:30:09.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46142025-03-07T23:30:09.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46152025-03-07T23:30:09.157ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "09e84632-108e-4734-87a5-4507094417b3", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
46162025-03-07T23:30:09.157ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cmpa
46172025-03-07T23:30:09.163ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
46182025-03-07T23:30:09.164ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
46192025-03-07T23:30:09.170ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges/add
46202025-03-07T23:30:09.179ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46212025-03-07T23:30:09.179ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46222025-03-07T23:30:09.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46232025-03-07T23:30:09.180ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46242025-03-07T23:30:09.182ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
46252025-03-07T23:30:09.182ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
46262025-03-07T23:30:09.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46272025-03-07T23:30:09.187ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46282025-03-07T23:30:09.187ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46292025-03-07T23:30:09.189ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
46302025-03-07T23:30:09.189ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46312025-03-07T23:30:09.189ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "30fe0aed-2241-4bbe-b53a-81ddeb1731e3", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:08 GMT"} })
46322025-03-07T23:30:09.204ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
46332025-03-07T23:30:09.233ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
46342025-03-07T23:30:09.240ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
46352025-03-07T23:30:09.242ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database uri = /v1/system/ip-pools/default/ranges/add
46362025-03-07T23:30:09.250ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
46372025-03-07T23:30:09.261ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46382025-03-07T23:30:09.283ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
46392025-03-07T23:30:09.284ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "391c75a9-2b10-4e0e-9a57-d34d0264c794", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46402025-03-07T23:30:09.284ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
46412025-03-07T23:30:09.285ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "96456a52-60fe-4941-a7e6-7e87260d44d0", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46422025-03-07T23:30:09.286ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/0/component/rot/cfpa
46432025-03-07T23:30:09.286ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges/add
46442025-03-07T23:30:09.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
46452025-03-07T23:30:09.289ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e366a9db-33d3-4ed5-91bc-ce02c5f81c90", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46462025-03-07T23:30:09.290ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1
46472025-03-07T23:30:09.291ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4ea19d0d-4c9d-47ba-bfca-e9b9b3e494c8", "content-length": "723", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46482025-03-07T23:30:09.291ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0
46492025-03-07T23:30:09.294ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "bda6f75a-d93a-4956-805f-d29246c5c220", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46502025-03-07T23:30:09.294ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1
46512025-03-07T23:30:09.296ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "57f8e357-6c96-423c-8555-ee382696b2b3", "content-length": "109", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46522025-03-07T23:30:09.296ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0
46532025-03-07T23:30:09.296ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 219807 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fa99c442-327d-4254-a487-5936747f8c34 response_code = 201 uri = /v1/system/ip-pools/default/ranges/add
46542025-03-07T23:30:09.297ZINFOtest_unauthorized (external client test context): client received response status = 201
46552025-03-07T23:30:09.297ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
46562025-03-07T23:30:09.297ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f uri = /v1/system/ip-pools/default/silos
46572025-03-07T23:30:09.298ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f uri = /v1/system/ip-pools/default/silos
46582025-03-07T23:30:09.298ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
46592025-03-07T23:30:09.298ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46602025-03-07T23:30:09.298ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46612025-03-07T23:30:09.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46622025-03-07T23:30:09.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46632025-03-07T23:30:09.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46642025-03-07T23:30:09.304ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46652025-03-07T23:30:09.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
46662025-03-07T23:30:09.306ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46672025-03-07T23:30:09.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46682025-03-07T23:30:09.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46692025-03-07T23:30:09.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46702025-03-07T23:30:09.307ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b4c47b10-5739-410b-aa05-d6b19f8ed97c", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46712025-03-07T23:30:09.307ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1
46722025-03-07T23:30:09.309ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46732025-03-07T23:30:09.309ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46742025-03-07T23:30:09.309ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46752025-03-07T23:30:09.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46762025-03-07T23:30:09.311ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46772025-03-07T23:30:09.318ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
46782025-03-07T23:30:09.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46792025-03-07T23:30:09.320ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46802025-03-07T23:30:09.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46812025-03-07T23:30:09.323ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
46822025-03-07T23:30:09.323ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46832025-03-07T23:30:09.323ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46842025-03-07T23:30:09.323ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46852025-03-07T23:30:09.323ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46862025-03-07T23:30:09.325ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "20689f20-be55-4e02-bf0a-77c7c4d1831f", "content-length": "169", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46872025-03-07T23:30:09.325ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0
46882025-03-07T23:30:09.326ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46892025-03-07T23:30:09.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
46902025-03-07T23:30:09.326ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
46912025-03-07T23:30:09.327ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
46922025-03-07T23:30:09.329ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3e5ddd22-ea00-49e9-92eb-c86a7b1b623a", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
46932025-03-07T23:30:09.330ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1
46942025-03-07T23:30:09.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46952025-03-07T23:30:09.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
46962025-03-07T23:30:09.336ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f uri = /v1/system/ip-pools/default/silos
46972025-03-07T23:30:09.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
46982025-03-07T23:30:09.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
46992025-03-07T23:30:09.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47002025-03-07T23:30:09.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
47012025-03-07T23:30:09.339ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
47022025-03-07T23:30:09.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47032025-03-07T23:30:09.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47042025-03-07T23:30:09.340ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47052025-03-07T23:30:09.341ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7ea35273-5444-424c-b4f9-641a35e74cb8", "content-length": "178", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47062025-03-07T23:30:09.341ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cmpa
47072025-03-07T23:30:09.342ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "934f8de6-fa01-4335-9da1-ef58486fa8c6", "content-length": "702", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47082025-03-07T23:30:09.342ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
47092025-03-07T23:30:09.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
47102025-03-07T23:30:09.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
47112025-03-07T23:30:09.347ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47122025-03-07T23:30:09.347ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47132025-03-07T23:30:09.348ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47142025-03-07T23:30:09.348ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1107ce4-05b3-4241-916d-2221f621bbd9", "content-length": "727", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47152025-03-07T23:30:09.348ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
47162025-03-07T23:30:09.350ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc419c7c-0703-4c0b-a12e-ca3c8df16697", "content-length": "729", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47172025-03-07T23:30:09.350ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39609 method = GET uri = http://[::1]:39609/sp/sled/1/component/rot/cfpa
47182025-03-07T23:30:09.350ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47192025-03-07T23:30:09.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47202025-03-07T23:30:09.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47212025-03-07T23:30:09.352ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39609 result = Ok(Response { url: "http://[::1]:39609/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9bd4c392-aa56-4a1f-a541-2a51b0daeec1", "content-length": "728", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47222025-03-07T23:30:09.352ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
47232025-03-07T23:30:09.352ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47242025-03-07T23:30:09.352ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
47252025-03-07T23:30:09.352ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
47262025-03-07T23:30:09.353ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
47272025-03-07T23:30:09.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/system/ip-pools/default/silos
47282025-03-07T23:30:09.353ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/ip-pools/default/silos
47292025-03-07T23:30:09.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47302025-03-07T23:30:09.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47312025-03-07T23:30:09.353ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47322025-03-07T23:30:09.355ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
47332025-03-07T23:30:09.360ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
47342025-03-07T23:30:09.360ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
47352025-03-07T23:30:09.360ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47362025-03-07T23:30:09.360ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
47372025-03-07T23:30:09.360ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
47382025-03-07T23:30:09.360ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
47392025-03-07T23:30:09.361ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
47402025-03-07T23:30:09.361ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47412025-03-07T23:30:09.361ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47422025-03-07T23:30:09.361ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47432025-03-07T23:30:09.363ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
47442025-03-07T23:30:09.367ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
47452025-03-07T23:30:09.367ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
47462025-03-07T23:30:09.367ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
47472025-03-07T23:30:09.368ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
47482025-03-07T23:30:09.368ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
47492025-03-07T23:30:09.378ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/system/ip-pools/default/silos
47502025-03-07T23:30:09.378ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = IpPoolList uri = /v1/system/ip-pools/default/silos
47512025-03-07T23:30:09.379ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
47522025-03-07T23:30:09.379ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47532025-03-07T23:30:09.379ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47542025-03-07T23:30:09.379ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47552025-03-07T23:30:09.413ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
47562025-03-07T23:30:09.413ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47572025-03-07T23:30:09.416ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = f153cac5-9afa-4c7c-be4c-4a487ab8fb31 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47582025-03-07T23:30:09.416ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = f153cac5-9afa-4c7c-be4c-4a487ab8fb31 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47592025-03-07T23:30:09.416ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = f153cac5-9afa-4c7c-be4c-4a487ab8fb31 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47602025-03-07T23:30:09.416ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = f153cac5-9afa-4c7c-be4c-4a487ab8fb31 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47612025-03-07T23:30:09.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
47622025-03-07T23:30:09.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools/default/silos
47632025-03-07T23:30:09.427ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database uri = /v1/system/ip-pools/default/silos
47642025-03-07T23:30:09.427ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
47652025-03-07T23:30:09.427ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
47662025-03-07T23:30:09.428ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 13933 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = f153cac5-9afa-4c7c-be4c-4a487ab8fb31 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47672025-03-07T23:30:09.428ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "f153cac5-9afa-4c7c-be4c-4a487ab8fb31", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47682025-03-07T23:30:09.428ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47692025-03-07T23:30:09.429ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e562b2ca-2c9b-4e3e-a362-5e2e048c5971 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47702025-03-07T23:30:09.429ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e562b2ca-2c9b-4e3e-a362-5e2e048c5971 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47712025-03-07T23:30:09.429ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e562b2ca-2c9b-4e3e-a362-5e2e048c5971 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47722025-03-07T23:30:09.430ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e562b2ca-2c9b-4e3e-a362-5e2e048c5971 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47732025-03-07T23:30:09.439ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9772 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e562b2ca-2c9b-4e3e-a362-5e2e048c5971 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47742025-03-07T23:30:09.439ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e562b2ca-2c9b-4e3e-a362-5e2e048c5971", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47752025-03-07T23:30:09.439ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
47762025-03-07T23:30:09.439ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47772025-03-07T23:30:09.439ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
47782025-03-07T23:30:09.567ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:57532
47792025-03-07T23:30:09.567ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:57532 background_task = inventory_collection body = None method = GET uri = http://[::1]:57532/inventory
47802025-03-07T23:30:09.581ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:52437 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
47812025-03-07T23:30:09.581ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47822025-03-07T23:30:09.581ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47832025-03-07T23:30:09.582ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:52437 req_id = 9578a020-6ccc-4805-931a-b8b4651aa421 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
47842025-03-07T23:30:09.584ZINFOtest_unauthorized (dropshot): request completed latency_us = 2052 local_addr = [::1]:57532 method = GET remote_addr = [::1]:52437 req_id = 9578a020-6ccc-4805-931a-b8b4651aa421 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
47852025-03-07T23:30:09.584ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 286922 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4293a841-4316-4246-bc67-e5a26b219d3f response_code = 201 uri = /v1/system/ip-pools/default/silos
47862025-03-07T23:30:09.585ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47872025-03-07T23:30:09.586ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47882025-03-07T23:30:09.586ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47892025-03-07T23:30:09.586ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47902025-03-07T23:30:09.586ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:57532 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:57532/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "9578a020-6ccc-4805-931a-b8b4651aa421", "content-length": "5165", "date": "Fri, 07 Mar 2025 23:30:09 GMT"} })
47912025-03-07T23:30:09.588ZDEBGtest_unauthorized (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
47922025-03-07T23:30:09.588ZDEBGtest_unauthorized (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
47932025-03-07T23:30:09.588ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
47942025-03-07T23:30:09.590ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
47952025-03-07T23:30:09.590ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47962025-03-07T23:30:09.590ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
47972025-03-07T23:30:09.590ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
47982025-03-07T23:30:09.591ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
47992025-03-07T23:30:09.591ZINFOtest_unauthorized (external client test context): client received response status = 201
48002025-03-07T23:30:09.592ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects
48012025-03-07T23:30:09.592ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 uri = /v1/projects
48022025-03-07T23:30:09.592ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 uri = /v1/projects
48032025-03-07T23:30:09.592ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
48042025-03-07T23:30:09.592ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48052025-03-07T23:30:09.592ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48062025-03-07T23:30:09.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48072025-03-07T23:30:09.602ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
48082025-03-07T23:30:09.608ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
48092025-03-07T23:30:09.609ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
48102025-03-07T23:30:09.614ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
48112025-03-07T23:30:09.615ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
48122025-03-07T23:30:09.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48132025-03-07T23:30:09.616ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48142025-03-07T23:30:09.617ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48152025-03-07T23:30:09.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
48162025-03-07T23:30:09.684ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
48172025-03-07T23:30:09.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48182025-03-07T23:30:09.684ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48192025-03-07T23:30:09.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48202025-03-07T23:30:09.689ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48212025-03-07T23:30:09.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48222025-03-07T23:30:09.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48232025-03-07T23:30:09.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48242025-03-07T23:30:09.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
48252025-03-07T23:30:09.706ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
48262025-03-07T23:30:09.706ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48272025-03-07T23:30:09.706ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48282025-03-07T23:30:09.706ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48292025-03-07T23:30:09.710ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
48302025-03-07T23:30:09.710ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
48312025-03-07T23:30:09.710ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48322025-03-07T23:30:09.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48332025-03-07T23:30:09.711ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48342025-03-07T23:30:09.738ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48352025-03-07T23:30:09.738ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
48362025-03-07T23:30:09.738ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
48372025-03-07T23:30:09.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
48382025-03-07T23:30:09.791ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
48392025-03-07T23:30:09.797ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
48402025-03-07T23:30:09.797ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 uri = /v1/projects
48412025-03-07T23:30:09.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
48422025-03-07T23:30:09.797ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
48432025-03-07T23:30:09.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource = Database uri = /v1/projects
48442025-03-07T23:30:09.797ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 roles = RoleSet { roles: {} } uri = /v1/projects
48452025-03-07T23:30:09.798ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource = Database result = Ok(()) uri = /v1/projects
48462025-03-07T23:30:09.808ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
48472025-03-07T23:30:09.808ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource = Database uri = /v1/projects
48482025-03-07T23:30:09.808ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 roles = RoleSet { roles: {} } uri = /v1/projects
48492025-03-07T23:30:09.809ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource = Database result = Ok(()) uri = /v1/projects
48502025-03-07T23:30:09.819ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
48512025-03-07T23:30:09.823ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
48522025-03-07T23:30:09.823ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create
48532025-03-07T23:30:09.824ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"","name":"demo-project"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20} saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48542025-03-07T23:30:09.824ZINFOtest_unauthorized (SecStore): creating saga saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create
48552025-03-07T23:30:09.940ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create
48562025-03-07T23:30:09.940ZINFOtest_unauthorized (SEC): saga start saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48572025-03-07T23:30:09.940ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48582025-03-07T23:30:09.940ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48592025-03-07T23:30:09.965ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48602025-03-07T23:30:09.965ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48612025-03-07T23:30:09.973ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48622025-03-07T23:30:09.973ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48632025-03-07T23:30:09.978ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48642025-03-07T23:30:09.978ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48652025-03-07T23:30:09.978ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48662025-03-07T23:30:09.978ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48672025-03-07T23:30:09.979ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48682025-03-07T23:30:09.982ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48692025-03-07T23:30:09.982ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48702025-03-07T23:30:09.982ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48712025-03-07T23:30:09.983ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48722025-03-07T23:30:09.985ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48732025-03-07T23:30:09.995ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48742025-03-07T23:30:09.995ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48752025-03-07T23:30:09.995ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48762025-03-07T23:30:09.995ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = ProjectCreateRecord
48772025-03-07T23:30:10.025ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48782025-03-07T23:30:10.025ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String(""), "id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "name": String("demo-project"), "time_created": String("2025-03-07T23:30:09.978568Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:09.978568Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]) node_id = 0 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48792025-03-07T23:30:10.029ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48802025-03-07T23:30:10.029ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48812025-03-07T23:30:10.039ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48822025-03-07T23:30:10.039ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd0a:2f3b:9065::/48"), "name": String("default")}}) node_id = 1 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48832025-03-07T23:30:10.044ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48842025-03-07T23:30:10.044ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48852025-03-07T23:30:10.055ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48862025-03-07T23:30:10.055ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48872025-03-07T23:30:10.058ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48882025-03-07T23:30:10.059ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48892025-03-07T23:30:10.082ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48902025-03-07T23:30:10.082ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("182052df-e0ed-456b-aca9-6adc62b39334")) node_id = 3 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48912025-03-07T23:30:10.094ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48922025-03-07T23:30:10.100ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48932025-03-07T23:30:10.122ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48942025-03-07T23:30:10.122ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("558b943f-615e-41e8-99e8-49769e9604aa")) node_id = 4 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48952025-03-07T23:30:10.140ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48962025-03-07T23:30:10.140ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48972025-03-07T23:30:10.143ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
48982025-03-07T23:30:10.143ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("aec29c0f-649b-4faf-b4ec-aa1fc47d5613")) node_id = 5 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
48992025-03-07T23:30:10.145ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49002025-03-07T23:30:10.145ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49012025-03-07T23:30:10.148ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49022025-03-07T23:30:10.148ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("22e5cce7-b059-4caa-91bb-b63fa65146e2")) node_id = 6 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49032025-03-07T23:30:10.151ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49042025-03-07T23:30:10.151ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49052025-03-07T23:30:10.153ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49062025-03-07T23:30:10.153ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("55e33604-b960-44c3-a28d-f4626f952ce3")) node_id = 7 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49072025-03-07T23:30:10.155ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49082025-03-07T23:30:10.155ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49092025-03-07T23:30:10.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49102025-03-07T23:30:10.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49112025-03-07T23:30:10.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
49122025-03-07T23:30:10.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
49132025-03-07T23:30:10.158ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49142025-03-07T23:30:10.158ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")) node_id = 8 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49152025-03-07T23:30:10.164ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49162025-03-07T23:30:10.164ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49172025-03-07T23:30:10.165ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
49182025-03-07T23:30:10.165ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
49192025-03-07T23:30:10.167ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49202025-03-07T23:30:10.167ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("faa36720-8d06-4c5a-8e59-3859e80311a0")) node_id = 9 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49212025-03-07T23:30:10.182ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
49222025-03-07T23:30:10.182ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49232025-03-07T23:30:10.193ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49242025-03-07T23:30:10.194ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49252025-03-07T23:30:10.203ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49262025-03-07T23:30:10.203ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49272025-03-07T23:30:10.203ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49282025-03-07T23:30:10.203ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49292025-03-07T23:30:10.203ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49302025-03-07T23:30:10.217ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49312025-03-07T23:30:10.218ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49322025-03-07T23:30:10.218ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49332025-03-07T23:30:10.220ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49342025-03-07T23:30:10.263ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49352025-03-07T23:30:10.263ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49362025-03-07T23:30:10.263ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49372025-03-07T23:30:10.266ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49382025-03-07T23:30:10.266ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
49392025-03-07T23:30:10.288ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 7f0613a0-76b4-47d0-8468-85cc01622126
49402025-03-07T23:30:10.288ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 7f0613a0-76b4-47d0-8468-85cc01622126 time_started = 2025-03-07 23:30:08.275603 UTC
49412025-03-07T23:30:10.289ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 2.29190276s iteration = 8 status = {"collection_id":"7f0613a0-76b4-47d0-8468-85cc01622126","time_done":"2025-03-07 23:30:09.588476 UTC","time_started":"2025-03-07 23:30:08.275603 UTC"}
49422025-03-07T23:30:10.289ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 8 reason = Dependency
49432025-03-07T23:30:10.289ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 21.696\u{b5}s iteration = 8 status = {"error":"task disabled"}
49442025-03-07T23:30:10.289ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 8 reason = Dependency
49452025-03-07T23:30:10.289ZWARNtest_unauthorized (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
49462025-03-07T23:30:10.289ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 17.645\u{b5}s iteration = 8 status = {"error":"no blueprint"}
49472025-03-07T23:30:10.292ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49482025-03-07T23:30:10.300ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49492025-03-07T23:30:10.300ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49502025-03-07T23:30:10.300ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49512025-03-07T23:30:10.300ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateVpc
49522025-03-07T23:30:10.334ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49532025-03-07T23:30:10.334ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("182052df-e0ed-456b-aca9-6adc62b39334"), "name": String("default"), "time_created": String("2025-03-07T23:30:10.202991Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.202991Z")}, "ipv6_prefix": String("fd0a:2f3b:9065::/48"), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "subnet_gen": Number(1), "system_router_id": String("558b943f-615e-41e8-99e8-49769e9604aa"), "vni": Number(137359)}]) node_id = 10 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49542025-03-07T23:30:10.354ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49552025-03-07T23:30:10.354ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49562025-03-07T23:30:10.362ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49572025-03-07T23:30:10.363ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49582025-03-07T23:30:10.363ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49592025-03-07T23:30:10.363ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49602025-03-07T23:30:10.363ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49612025-03-07T23:30:10.370ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49622025-03-07T23:30:10.370ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49632025-03-07T23:30:10.370ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49642025-03-07T23:30:10.371ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49652025-03-07T23:30:10.379ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49662025-03-07T23:30:10.379ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49672025-03-07T23:30:10.379ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49682025-03-07T23:30:10.380ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49692025-03-07T23:30:10.392ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49702025-03-07T23:30:10.400ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49712025-03-07T23:30:10.400ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49722025-03-07T23:30:10.401ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49732025-03-07T23:30:10.401ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateRouter
49742025-03-07T23:30:10.483ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49752025-03-07T23:30:10.483ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("558b943f-615e-41e8-99e8-49769e9604aa"), "lookup_type": Object {"ById": String("558b943f-615e-41e8-99e8-49769e9604aa")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 11 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49762025-03-07T23:30:10.493ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
49772025-03-07T23:30:10.493ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
49782025-03-07T23:30:10.532ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49792025-03-07T23:30:10.533ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49802025-03-07T23:30:10.533ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49812025-03-07T23:30:10.533ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49822025-03-07T23:30:10.539ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49832025-03-07T23:30:10.550ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49842025-03-07T23:30:10.551ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49852025-03-07T23:30:10.551ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49862025-03-07T23:30:10.551ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49872025-03-07T23:30:10.556ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49882025-03-07T23:30:10.556ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49892025-03-07T23:30:10.556ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49902025-03-07T23:30:10.557ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49912025-03-07T23:30:10.566ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
49922025-03-07T23:30:10.566ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
49932025-03-07T23:30:10.567ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49942025-03-07T23:30:10.577ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49952025-03-07T23:30:10.577ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49962025-03-07T23:30:10.577ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49972025-03-07T23:30:10.577ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV4Route
49982025-03-07T23:30:10.582ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
49992025-03-07T23:30:10.583ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50002025-03-07T23:30:10.583ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50012025-03-07T23:30:10.584ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
50022025-03-07T23:30:10.587ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50032025-03-07T23:30:10.587ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50042025-03-07T23:30:10.593ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50052025-03-07T23:30:10.593ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50062025-03-07T23:30:10.635ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50072025-03-07T23:30:10.635ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50082025-03-07T23:30:10.635ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50092025-03-07T23:30:10.635ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50102025-03-07T23:30:10.636ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50112025-03-07T23:30:10.646ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50122025-03-07T23:30:10.646ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50132025-03-07T23:30:10.646ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50142025-03-07T23:30:10.647ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50152025-03-07T23:30:10.665ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50162025-03-07T23:30:10.665ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50172025-03-07T23:30:10.665ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50182025-03-07T23:30:10.666ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50192025-03-07T23:30:10.683ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50202025-03-07T23:30:10.692ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50212025-03-07T23:30:10.693ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50222025-03-07T23:30:10.693ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50232025-03-07T23:30:10.693ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateV6Route
50242025-03-07T23:30:10.701ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50252025-03-07T23:30:10.701ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50262025-03-07T23:30:10.762ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50272025-03-07T23:30:10.762ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50282025-03-07T23:30:10.782ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50292025-03-07T23:30:10.782ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50302025-03-07T23:30:10.782ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50312025-03-07T23:30:10.782ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50322025-03-07T23:30:10.783ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50332025-03-07T23:30:10.799ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50342025-03-07T23:30:10.799ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50352025-03-07T23:30:10.799ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50362025-03-07T23:30:10.800ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50372025-03-07T23:30:10.838ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50382025-03-07T23:30:10.838ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50392025-03-07T23:30:10.838ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50402025-03-07T23:30:10.839ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50412025-03-07T23:30:10.850ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50422025-03-07T23:30:10.858ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnet
50432025-03-07T23:30:10.874ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50442025-03-07T23:30:10.874ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "lookup_type": Object {"ById": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "name": String("default"), "time_created": String("2025-03-07T23:30:10.782659Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.782659Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd0a:2f3b:9065::/64"), "rcgen": Number(1), "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}]) node_id = 14 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50452025-03-07T23:30:10.890ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50462025-03-07T23:30:10.890ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50472025-03-07T23:30:10.899ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50482025-03-07T23:30:10.899ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50492025-03-07T23:30:10.899ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50502025-03-07T23:30:10.900ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50512025-03-07T23:30:10.901ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50522025-03-07T23:30:10.906ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50532025-03-07T23:30:10.906ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50542025-03-07T23:30:10.906ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50552025-03-07T23:30:10.907ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50562025-03-07T23:30:10.916ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50572025-03-07T23:30:10.917ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50582025-03-07T23:30:10.917ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50592025-03-07T23:30:10.918ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50602025-03-07T23:30:10.921ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50612025-03-07T23:30:10.931ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50622025-03-07T23:30:10.931ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50632025-03-07T23:30:10.931ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50642025-03-07T23:30:10.931ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateSubnetRoute
50652025-03-07T23:30:10.939ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50662025-03-07T23:30:10.940ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("55e33604-b960-44c3-a28d-f4626f952ce3"), "lookup_type": Object {"ById": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")}, "parent": Object {"key": String("558b943f-615e-41e8-99e8-49769e9604aa"), "lookup_type": Object {"ById": String("558b943f-615e-41e8-99e8-49769e9604aa")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 15 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50672025-03-07T23:30:10.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50682025-03-07T23:30:10.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50692025-03-07T23:30:10.947ZDEBGtest_unauthorized (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 51584beb-56f8-4b2f-9d63-6c01f32f14df, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2025-03-07T23:30:10.946408124Z, time_modified: 2025-03-07T23:30:10.946408124Z, time_deleted: None }, vpc_id: 182052df-e0ed-456b-aca9-6adc62b39334, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: ca3ac05c-a599-4a3c-9186-af3b7983f07a, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2025-03-07T23:30:10.946423088Z, time_modified: 2025-03-07T23:30:10.946423088Z, time_deleted: None }, vpc_id: 182052df-e0ed-456b-aca9-6adc62b39334, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: b83a21b4-8a5b-4cc4-a019-a70f1cbc2b5a, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2025-03-07T23:30:10.946431470Z, time_modified: 2025-03-07T23:30:10.946431470Z, time_deleted: None }, vpc_id: 182052df-e0ed-456b-aca9-6adc62b39334, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
50702025-03-07T23:30:10.947ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50712025-03-07T23:30:10.947ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50722025-03-07T23:30:10.947ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50732025-03-07T23:30:10.947ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50742025-03-07T23:30:10.947ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50752025-03-07T23:30:10.950ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50762025-03-07T23:30:10.950ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50772025-03-07T23:30:10.950ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50782025-03-07T23:30:10.951ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50792025-03-07T23:30:10.954ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50802025-03-07T23:30:10.954ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50812025-03-07T23:30:10.954ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50822025-03-07T23:30:10.955ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50832025-03-07T23:30:10.966ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50842025-03-07T23:30:10.967ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50852025-03-07T23:30:10.968ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50862025-03-07T23:30:10.968ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50872025-03-07T23:30:10.968ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcUpdateFirewall
50882025-03-07T23:30:10.991ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50892025-03-07T23:30:10.991ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("51584beb-56f8-4b2f-9d63-6c01f32f14df"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:30:10.946408124Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946408124Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("ca3ac05c-a599-4a3c-9186-af3b7983f07a"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:30:10.946423088Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946423088Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("b83a21b4-8a5b-4cc4-a019-a70f1cbc2b5a"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:30:10.946431470Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946431470Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}]) node_id = 16 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50902025-03-07T23:30:10.994ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
50912025-03-07T23:30:10.994ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
50922025-03-07T23:30:10.997ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50932025-03-07T23:30:10.999ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50942025-03-07T23:30:10.999ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50952025-03-07T23:30:10.999ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50962025-03-07T23:30:10.999ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50972025-03-07T23:30:11.004ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50982025-03-07T23:30:11.004ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
50992025-03-07T23:30:11.004ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51002025-03-07T23:30:11.005ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51012025-03-07T23:30:11.009ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51022025-03-07T23:30:11.009ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51032025-03-07T23:30:11.009ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51042025-03-07T23:30:11.010ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51052025-03-07T23:30:11.012ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51062025-03-07T23:30:11.021ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51072025-03-07T23:30:11.022ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51082025-03-07T23:30:11.022ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51092025-03-07T23:30:11.022ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51102025-03-07T23:30:11.029ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51112025-03-07T23:30:11.029ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51122025-03-07T23:30:11.030ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51132025-03-07T23:30:11.037ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51142025-03-07T23:30:11.037ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51152025-03-07T23:30:11.038ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51162025-03-07T23:30:11.043ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: faa36720-8d06-4c5a-8e59-3859e80311a0, lookup_type: ById(faa36720-8d06-4c5a-8e59-3859e80311a0) } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51172025-03-07T23:30:11.044ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51182025-03-07T23:30:11.044ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51192025-03-07T23:30:11.044ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51202025-03-07T23:30:11.044ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51212025-03-07T23:30:11.054ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51222025-03-07T23:30:11.054ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51232025-03-07T23:30:11.054ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51242025-03-07T23:30:11.057ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51252025-03-07T23:30:11.060ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51262025-03-07T23:30:11.060ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51272025-03-07T23:30:11.060ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51282025-03-07T23:30:11.064ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51292025-03-07T23:30:11.066ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51302025-03-07T23:30:11.081ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: faa36720-8d06-4c5a-8e59-3859e80311a0, lookup_type: ById(faa36720-8d06-4c5a-8e59-3859e80311a0) } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51312025-03-07T23:30:11.081ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51322025-03-07T23:30:11.081ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51332025-03-07T23:30:11.081ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcCreateGateway
51342025-03-07T23:30:11.107ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
51352025-03-07T23:30:11.107ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("faa36720-8d06-4c5a-8e59-3859e80311a0"), "lookup_type": Object {"ById": String("faa36720-8d06-4c5a-8e59-3859e80311a0")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 17 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
51362025-03-07T23:30:11.111ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
51372025-03-07T23:30:11.111ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
51382025-03-07T23:30:11.117ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51392025-03-07T23:30:11.117ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51402025-03-07T23:30:11.118ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51412025-03-07T23:30:11.121ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51422025-03-07T23:30:11.121ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51432025-03-07T23:30:11.122ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51442025-03-07T23:30:11.124ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51452025-03-07T23:30:11.124ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51462025-03-07T23:30:11.125ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51472025-03-07T23:30:11.127ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51482025-03-07T23:30:11.127ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51492025-03-07T23:30:11.127ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51502025-03-07T23:30:11.127ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51512025-03-07T23:30:11.128ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51522025-03-07T23:30:11.131ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51532025-03-07T23:30:11.131ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51542025-03-07T23:30:11.131ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51552025-03-07T23:30:11.132ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51562025-03-07T23:30:11.136ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51572025-03-07T23:30:11.136ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51582025-03-07T23:30:11.136ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51592025-03-07T23:30:11.137ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51602025-03-07T23:30:11.144ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51612025-03-07T23:30:11.157ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51622025-03-07T23:30:11.157ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51632025-03-07T23:30:11.157ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51642025-03-07T23:30:11.157ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51652025-03-07T23:30:11.157ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51662025-03-07T23:30:11.159ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51672025-03-07T23:30:11.159ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
51682025-03-07T23:30:11.159ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
51692025-03-07T23:30:11.161ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
51702025-03-07T23:30:11.163ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
51712025-03-07T23:30:11.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
51722025-03-07T23:30:11.171ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
51732025-03-07T23:30:11.172ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51742025-03-07T23:30:11.172ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51752025-03-07T23:30:11.172ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51762025-03-07T23:30:11.173ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51772025-03-07T23:30:11.177ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
51782025-03-07T23:30:11.178ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
51792025-03-07T23:30:11.181ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51802025-03-07T23:30:11.181ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51812025-03-07T23:30:11.181ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51822025-03-07T23:30:11.181ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51832025-03-07T23:30:11.185ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51842025-03-07T23:30:11.193ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51852025-03-07T23:30:11.193ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51862025-03-07T23:30:11.193ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51872025-03-07T23:30:11.193ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51882025-03-07T23:30:11.202ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
51892025-03-07T23:30:11.202ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = []
51902025-03-07T23:30:11.202ZDEBGtest_unauthorized (nexus): resolved 0 rules for sleds
51912025-03-07T23:30:11.228ZDEBGtest_unauthorized (nexus): resolved sleds for vpc default vpc_to_sled = []
51922025-03-07T23:30:11.228ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
51932025-03-07T23:30:11.228ZINFOtest_unauthorized (nexus): updated firewall rules on 0 sleds
51942025-03-07T23:30:11.228ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51952025-03-07T23:30:11.228ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51962025-03-07T23:30:11.230ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_node = VpcNotifySleds
51972025-03-07T23:30:11.234ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
51982025-03-07T23:30:11.234ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
51992025-03-07T23:30:11.237ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52002025-03-07T23:30:11.237ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
52012025-03-07T23:30:11.239ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52022025-03-07T23:30:11.239ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 19 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
52032025-03-07T23:30:11.242ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52042025-03-07T23:30:11.242ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
52052025-03-07T23:30:11.244ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52062025-03-07T23:30:11.244ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
52072025-03-07T23:30:11.246ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52082025-03-07T23:30:11.246ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8
52092025-03-07T23:30:11.267ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
52102025-03-07T23:30:11.312ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52112025-03-07T23:30:11.312ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 08228f41-8575-4da4-a2b4-3b451ae2d6c8 saga_name = project-create saga_result = SagaResult { saga_id: 08228f41-8575-4da4-a2b4-3b451ae2d6c8, saga_log: SagaLog { saga_id: 08228f41-8575-4da4-a2b4-3b451ae2d6c8, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String(""), "id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "name": String("demo-project"), "time_created": String("2025-03-07T23:30:09.978568Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:09.978568Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd0a:2f3b:9065::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("182052df-e0ed-456b-aca9-6adc62b39334")), 4: Succeeded(String("558b943f-615e-41e8-99e8-49769e9604aa")), 5: Succeeded(String("aec29c0f-649b-4faf-b4ec-aa1fc47d5613")), 6: Succeeded(String("22e5cce7-b059-4caa-91bb-b63fa65146e2")), 7: Succeeded(String("55e33604-b960-44c3-a28d-f4626f952ce3")), 8: Succeeded(String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")), 9: Succeeded(String("faa36720-8d06-4c5a-8e59-3859e80311a0")), 10: Succeeded(Array [Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("182052df-e0ed-456b-aca9-6adc62b39334"), "name": String("default"), "time_created": String("2025-03-07T23:30:10.202991Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.202991Z")}, "ipv6_prefix": String("fd0a:2f3b:9065::/48"), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "subnet_gen": Number(1), "system_router_id": String("558b943f-615e-41e8-99e8-49769e9604aa"), "vni": Number(137359)}]), 11: Succeeded(Object {"key": String("558b943f-615e-41e8-99e8-49769e9604aa"), "lookup_type": Object {"ById": String("558b943f-615e-41e8-99e8-49769e9604aa")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "lookup_type": Object {"ById": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "name": String("default"), "time_created": String("2025-03-07T23:30:10.782659Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.782659Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd0a:2f3b:9065::/64"), "rcgen": Number(1), "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}]), 15: Succeeded(Object {"key": String("55e33604-b960-44c3-a28d-f4626f952ce3"), "lookup_type": Object {"ById": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")}, "parent": Object {"key": String("558b943f-615e-41e8-99e8-49769e9604aa"), "lookup_type": Object {"ById": String("558b943f-615e-41e8-99e8-49769e9604aa")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("51584beb-56f8-4b2f-9d63-6c01f32f14df"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:30:10.946408124Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946408124Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("ca3ac05c-a599-4a3c-9186-af3b7983f07a"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:30:10.946423088Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946423088Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("b83a21b4-8a5b-4cc4-a019-a70f1cbc2b5a"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:30:10.946431470Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946431470Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}]), 17: Succeeded(Object {"key": String("faa36720-8d06-4c5a-8e59-3859e80311a0"), "lookup_type": Object {"ById": String("faa36720-8d06-4c5a-8e59-3859e80311a0")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("faa36720-8d06-4c5a-8e59-3859e80311a0"), "default_subnet_id": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "default_v4_route_id": String("aec29c0f-649b-4faf-b4ec-aa1fc47d5613"), "default_v6_route_id": String("22e5cce7-b059-4caa-91bb-b63fa65146e2"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("51584beb-56f8-4b2f-9d63-6c01f32f14df"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:30:10.946408124Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946408124Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("ca3ac05c-a599-4a3c-9186-af3b7983f07a"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:30:10.946423088Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946423088Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("b83a21b4-8a5b-4cc4-a019-a70f1cbc2b5a"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:30:10.946431470Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.946431470Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}], "gateway": Object {"key": String("faa36720-8d06-4c5a-8e59-3859e80311a0"), "lookup_type": Object {"ById": String("faa36720-8d06-4c5a-8e59-3859e80311a0")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String(""), "id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "name": String("demo-project"), "time_created": String("2025-03-07T23:30:09.978568Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:09.978568Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("55e33604-b960-44c3-a28d-f4626f952ce3"), "lookup_type": Object {"ById": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")}, "parent": Object {"key": String("558b943f-615e-41e8-99e8-49769e9604aa"), "lookup_type": Object {"ById": String("558b943f-615e-41e8-99e8-49769e9604aa")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("558b943f-615e-41e8-99e8-49769e9604aa"), "lookup_type": Object {"ById": String("558b943f-615e-41e8-99e8-49769e9604aa")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "lookup_type": Object {"ById": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3")}, "parent": Object {"key": String("182052df-e0ed-456b-aca9-6adc62b39334"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("81d663ad-afb5-4444-9e4c-156a9f15d2a3"), "name": String("default"), "time_created": String("2025-03-07T23:30:10.782659Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:10.782659Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd0a:2f3b:9065::/64"), "rcgen": Number(1), "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")}], "subnet_route_id": String("55e33604-b960-44c3-a28d-f4626f952ce3"), "system_router_id": String("558b943f-615e-41e8-99e8-49769e9604aa"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd0a:2f3b:9065::/48"), "name": String("default")}}, "vpc_id": String("182052df-e0ed-456b-aca9-6adc62b39334")} }) }
52122025-03-07T23:30:11.313ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1721158 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35935d07-818d-42f3-9197-548da957a5c9 response_code = 201 uri = /v1/projects
52132025-03-07T23:30:11.313ZINFOtest_unauthorized (external client test context): client received response status = 201
52142025-03-07T23:30:11.314ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
52152025-03-07T23:30:11.314ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 uri = /v1/vpcs?project=demo-project
52162025-03-07T23:30:11.314ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 uri = /v1/vpcs?project=demo-project
52172025-03-07T23:30:11.314ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=demo-project
52182025-03-07T23:30:11.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52192025-03-07T23:30:11.314ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52202025-03-07T23:30:11.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52212025-03-07T23:30:11.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52222025-03-07T23:30:11.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52232025-03-07T23:30:11.325ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52242025-03-07T23:30:11.346ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
52252025-03-07T23:30:11.346ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
52262025-03-07T23:30:11.346ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52272025-03-07T23:30:11.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52282025-03-07T23:30:11.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52292025-03-07T23:30:11.349ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
52302025-03-07T23:30:11.349ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52312025-03-07T23:30:11.349ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52322025-03-07T23:30:11.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52332025-03-07T23:30:11.352ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
52342025-03-07T23:30:11.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
52352025-03-07T23:30:11.355ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52362025-03-07T23:30:11.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52372025-03-07T23:30:11.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52382025-03-07T23:30:11.359ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
52392025-03-07T23:30:11.359ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
52402025-03-07T23:30:11.359ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52412025-03-07T23:30:11.359ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52422025-03-07T23:30:11.360ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52432025-03-07T23:30:11.370ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
52442025-03-07T23:30:11.370ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
52452025-03-07T23:30:11.370ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
52462025-03-07T23:30:11.371ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
52472025-03-07T23:30:11.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
52482025-03-07T23:30:11.386ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
52492025-03-07T23:30:11.386ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 uri = /v1/vpcs?project=demo-project
52502025-03-07T23:30:11.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52512025-03-07T23:30:11.386ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52522025-03-07T23:30:11.387ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52532025-03-07T23:30:11.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52542025-03-07T23:30:11.389ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52552025-03-07T23:30:11.390ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52562025-03-07T23:30:11.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
52572025-03-07T23:30:11.395ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
52582025-03-07T23:30:11.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52592025-03-07T23:30:11.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52602025-03-07T23:30:11.397ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52612025-03-07T23:30:11.400ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
52622025-03-07T23:30:11.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52632025-03-07T23:30:11.400ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52642025-03-07T23:30:11.402ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52652025-03-07T23:30:11.406ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
52662025-03-07T23:30:11.406ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52672025-03-07T23:30:11.406ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52682025-03-07T23:30:11.407ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52692025-03-07T23:30:11.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
52702025-03-07T23:30:11.410ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
52712025-03-07T23:30:11.411ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
52722025-03-07T23:30:11.420ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
52732025-03-07T23:30:11.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
52742025-03-07T23:30:11.420ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
52752025-03-07T23:30:11.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52762025-03-07T23:30:11.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52772025-03-07T23:30:11.420ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52782025-03-07T23:30:11.421ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c3ab0617-9e0b-4ed4-b83b-babda5400269 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
52792025-03-07T23:30:11.421ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c3ab0617-9e0b-4ed4-b83b-babda5400269 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
52802025-03-07T23:30:11.422ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c3ab0617-9e0b-4ed4-b83b-babda5400269 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
52812025-03-07T23:30:11.422ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c3ab0617-9e0b-4ed4-b83b-babda5400269 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
52822025-03-07T23:30:11.425ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
52832025-03-07T23:30:11.425ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52842025-03-07T23:30:11.425ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52852025-03-07T23:30:11.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52862025-03-07T23:30:11.427ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5762 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c3ab0617-9e0b-4ed4-b83b-babda5400269 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
52872025-03-07T23:30:11.430ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
52882025-03-07T23:30:11.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database uri = /v1/vpcs?project=demo-project
52892025-03-07T23:30:11.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
52902025-03-07T23:30:11.431ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
52912025-03-07T23:30:11.432ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c3ab0617-9e0b-4ed4-b83b-babda5400269", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:10 GMT"} })
52922025-03-07T23:30:11.432ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
52932025-03-07T23:30:11.435ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
52942025-03-07T23:30:11.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
52952025-03-07T23:30:11.444ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create
52962025-03-07T23:30:11.444ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":17,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[16,0,null],[15,17,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"Start":{"params":{"authz_project":{"key":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","lookup_type":{"ByName":"demo-project"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}},"vpc_create":{"description":"","dns_name":"demo-vpc","ipv6_prefix":null,"name":"demo-vpc"}}}},"End"]},"saga_name":"vpc-create","start_node":16} saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
52972025-03-07T23:30:11.444ZINFOtest_unauthorized (SecStore): creating saga saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create
52982025-03-07T23:30:11.445ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 9fc0fdba-4b37-4238-9637-0bcf8df25f19 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
52992025-03-07T23:30:11.445ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 9fc0fdba-4b37-4238-9637-0bcf8df25f19 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
53002025-03-07T23:30:11.445ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 9fc0fdba-4b37-4238-9637-0bcf8df25f19 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
53012025-03-07T23:30:11.446ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 9fc0fdba-4b37-4238-9637-0bcf8df25f19 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
53022025-03-07T23:30:11.464ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create
53032025-03-07T23:30:11.464ZINFOtest_unauthorized (SEC): saga start saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53042025-03-07T23:30:11.464ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53052025-03-07T23:30:11.465ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53062025-03-07T23:30:11.466ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 20862 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 9fc0fdba-4b37-4238-9637-0bcf8df25f19 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
53072025-03-07T23:30:11.467ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "9fc0fdba-4b37-4238-9637-0bcf8df25f19", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:10 GMT"} })
53082025-03-07T23:30:11.467ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53092025-03-07T23:30:11.468ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53102025-03-07T23:30:11.468ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
53112025-03-07T23:30:11.472ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53122025-03-07T23:30:11.472ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53132025-03-07T23:30:11.501ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53142025-03-07T23:30:11.501ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53152025-03-07T23:30:11.507ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53162025-03-07T23:30:11.508ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("87a33bee-6823-4ee4-af90-76b9fec98b34")) node_id = 0 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53172025-03-07T23:30:11.513ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53182025-03-07T23:30:11.513ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53192025-03-07T23:30:11.517ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53202025-03-07T23:30:11.517ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")) node_id = 1 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53212025-03-07T23:30:11.520ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53222025-03-07T23:30:11.520ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53232025-03-07T23:30:11.523ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53242025-03-07T23:30:11.523ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("e380af8b-ce8d-4023-84f4-f4091f0869af")) node_id = 2 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53252025-03-07T23:30:11.528ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53262025-03-07T23:30:11.528ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53272025-03-07T23:30:11.536ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53282025-03-07T23:30:11.536ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("d7a634b2-2d2b-4f72-bd1c-2fba91c3a152")) node_id = 3 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53292025-03-07T23:30:11.540ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53302025-03-07T23:30:11.540ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53312025-03-07T23:30:11.546ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53322025-03-07T23:30:11.546ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("81a0c9e9-9cb6-4316-9c26-f1deab7ebbed")) node_id = 4 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53332025-03-07T23:30:11.549ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53342025-03-07T23:30:11.549ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53352025-03-07T23:30:11.554ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53362025-03-07T23:30:11.554ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")) node_id = 5 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53372025-03-07T23:30:11.557ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53382025-03-07T23:30:11.557ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53392025-03-07T23:30:11.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53402025-03-07T23:30:11.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53412025-03-07T23:30:11.562ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53422025-03-07T23:30:11.562ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("93d2ae17-e561-4351-a047-46b3eccf5cb3")) node_id = 6 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53432025-03-07T23:30:11.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53442025-03-07T23:30:11.565ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53452025-03-07T23:30:11.565ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53462025-03-07T23:30:11.565ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
53472025-03-07T23:30:11.566ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53482025-03-07T23:30:11.566ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53492025-03-07T23:30:11.571ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53502025-03-07T23:30:11.571ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53512025-03-07T23:30:11.571ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53522025-03-07T23:30:11.572ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53532025-03-07T23:30:11.572ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53542025-03-07T23:30:11.576ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53552025-03-07T23:30:11.577ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53562025-03-07T23:30:11.577ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53572025-03-07T23:30:11.578ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53582025-03-07T23:30:11.581ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53592025-03-07T23:30:11.581ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53602025-03-07T23:30:11.582ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53612025-03-07T23:30:11.583ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53622025-03-07T23:30:11.587ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53632025-03-07T23:30:11.611ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53642025-03-07T23:30:11.612ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53652025-03-07T23:30:11.612ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53662025-03-07T23:30:11.613ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateVpc
53672025-03-07T23:30:11.623ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53682025-03-07T23:30:11.623ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("demo-vpc"), "firewall_gen": Number(1), "identity": Object {"description": String(""), "id": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "name": String("demo-vpc"), "time_created": String("2025-03-07T23:30:11.571779Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.571779Z")}, "ipv6_prefix": String("fd6a:5fca:48dd::/48"), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "subnet_gen": Number(1), "system_router_id": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "vni": Number(13361673)}]) node_id = 7 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53692025-03-07T23:30:11.633ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53702025-03-07T23:30:11.633ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53712025-03-07T23:30:11.636ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53722025-03-07T23:30:11.636ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53732025-03-07T23:30:11.636ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53742025-03-07T23:30:11.636ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53752025-03-07T23:30:11.637ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53762025-03-07T23:30:11.645ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53772025-03-07T23:30:11.645ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53782025-03-07T23:30:11.645ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53792025-03-07T23:30:11.646ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53802025-03-07T23:30:11.651ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53812025-03-07T23:30:11.651ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53822025-03-07T23:30:11.651ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53832025-03-07T23:30:11.668ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53842025-03-07T23:30:11.681ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53852025-03-07T23:30:11.703ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53862025-03-07T23:30:11.703ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53872025-03-07T23:30:11.703ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53882025-03-07T23:30:11.704ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateRouter
53892025-03-07T23:30:11.710ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53902025-03-07T23:30:11.710ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 8 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53912025-03-07T23:30:11.715ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
53922025-03-07T23:30:11.715ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
53932025-03-07T23:30:11.719ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
53942025-03-07T23:30:11.719ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
53952025-03-07T23:30:11.719ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
53962025-03-07T23:30:11.719ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
53972025-03-07T23:30:11.720ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
53982025-03-07T23:30:11.723ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
53992025-03-07T23:30:11.724ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54002025-03-07T23:30:11.724ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54012025-03-07T23:30:11.726ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54022025-03-07T23:30:11.747ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54032025-03-07T23:30:11.747ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54042025-03-07T23:30:11.747ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54052025-03-07T23:30:11.748ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54062025-03-07T23:30:11.752ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54072025-03-07T23:30:11.794ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54082025-03-07T23:30:11.794ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54092025-03-07T23:30:11.794ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54102025-03-07T23:30:11.795ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV4Route
54112025-03-07T23:30:11.805ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54122025-03-07T23:30:11.805ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54132025-03-07T23:30:11.819ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54142025-03-07T23:30:11.819ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54152025-03-07T23:30:11.823ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54162025-03-07T23:30:11.824ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54172025-03-07T23:30:11.824ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54182025-03-07T23:30:11.824ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54192025-03-07T23:30:11.825ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54202025-03-07T23:30:11.833ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54212025-03-07T23:30:11.833ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54222025-03-07T23:30:11.833ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54232025-03-07T23:30:11.834ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54242025-03-07T23:30:11.838ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54252025-03-07T23:30:11.838ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54262025-03-07T23:30:11.838ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54272025-03-07T23:30:11.839ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54282025-03-07T23:30:11.842ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54292025-03-07T23:30:11.853ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54302025-03-07T23:30:11.853ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54312025-03-07T23:30:11.853ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54322025-03-07T23:30:11.854ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateV6Route
54332025-03-07T23:30:11.861ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54342025-03-07T23:30:11.861ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54352025-03-07T23:30:11.865ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54362025-03-07T23:30:11.865ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54372025-03-07T23:30:11.868ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54382025-03-07T23:30:11.868ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54392025-03-07T23:30:11.868ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54402025-03-07T23:30:11.868ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54412025-03-07T23:30:11.869ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54422025-03-07T23:30:11.873ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54432025-03-07T23:30:11.873ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54442025-03-07T23:30:11.873ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54452025-03-07T23:30:11.873ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54462025-03-07T23:30:11.877ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54472025-03-07T23:30:11.877ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54482025-03-07T23:30:11.877ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54492025-03-07T23:30:11.878ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54502025-03-07T23:30:11.881ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54512025-03-07T23:30:11.890ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnet
54522025-03-07T23:30:11.896ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54532025-03-07T23:30:11.896ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "lookup_type": Object {"ById": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for demo-vpc"), "id": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "name": String("default"), "time_created": String("2025-03-07T23:30:11.868173Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.868173Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6a:5fca:48dd::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}]) node_id = 11 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54542025-03-07T23:30:11.900ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54552025-03-07T23:30:11.900ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54562025-03-07T23:30:11.904ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54572025-03-07T23:30:11.904ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54582025-03-07T23:30:11.904ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54592025-03-07T23:30:11.904ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54602025-03-07T23:30:11.905ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54612025-03-07T23:30:11.908ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54622025-03-07T23:30:11.908ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54632025-03-07T23:30:11.908ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54642025-03-07T23:30:11.909ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54652025-03-07T23:30:11.912ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54662025-03-07T23:30:11.912ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54672025-03-07T23:30:11.913ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54682025-03-07T23:30:11.913ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54692025-03-07T23:30:11.916ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54702025-03-07T23:30:11.924ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54712025-03-07T23:30:11.925ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54722025-03-07T23:30:11.925ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54732025-03-07T23:30:11.925ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateSubnetRoute
54742025-03-07T23:30:11.931ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54752025-03-07T23:30:11.931ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("81a0c9e9-9cb6-4316-9c26-f1deab7ebbed"), "lookup_type": Object {"ById": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")}, "parent": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 12 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54762025-03-07T23:30:11.934ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54772025-03-07T23:30:11.934ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54782025-03-07T23:30:11.937ZDEBGtest_unauthorized (nexus): default firewall rules for vpc demo-vpc rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 54b375c2-c401-4875-80c5-a90ac79822a8, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2025-03-07T23:30:11.937602683Z, time_modified: 2025-03-07T23:30:11.937602683Z, time_deleted: None }, vpc_id: 87a33bee-6823-4ee4-af90-76b9fec98b34, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("demo-vpc")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("demo-vpc")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 74c3768e-c0e0-4855-ab71-7d10a7f05cbd, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2025-03-07T23:30:11.937618118Z, time_modified: 2025-03-07T23:30:11.937618118Z, time_deleted: None }, vpc_id: 87a33bee-6823-4ee4-af90-76b9fec98b34, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("demo-vpc")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: e87149a4-2d49-4af5-90de-db4ee780256c, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2025-03-07T23:30:11.937625240Z, time_modified: 2025-03-07T23:30:11.937625240Z, time_deleted: None }, vpc_id: 87a33bee-6823-4ee4-af90-76b9fec98b34, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("demo-vpc")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
54792025-03-07T23:30:11.937ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54802025-03-07T23:30:11.937ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54812025-03-07T23:30:11.937ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54822025-03-07T23:30:11.937ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54832025-03-07T23:30:11.938ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54842025-03-07T23:30:11.941ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54852025-03-07T23:30:11.941ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54862025-03-07T23:30:11.941ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54872025-03-07T23:30:11.942ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54882025-03-07T23:30:11.945ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54892025-03-07T23:30:11.945ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54902025-03-07T23:30:11.945ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54912025-03-07T23:30:11.946ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54922025-03-07T23:30:11.949ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54932025-03-07T23:30:11.959ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54942025-03-07T23:30:11.959ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54952025-03-07T23:30:11.959ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54962025-03-07T23:30:11.959ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcUpdateFirewall
54972025-03-07T23:30:11.970ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
54982025-03-07T23:30:11.971ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("54b375c2-c401-4875-80c5-a90ac79822a8"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:30:11.937602683Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937602683Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("74c3768e-c0e0-4855-ab71-7d10a7f05cbd"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:30:11.937618118Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937618118Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("e87149a4-2d49-4af5-90de-db4ee780256c"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:30:11.937625240Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937625240Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}]) node_id = 13 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
54992025-03-07T23:30:11.976ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
55002025-03-07T23:30:11.976ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
55012025-03-07T23:30:11.978ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55022025-03-07T23:30:11.979ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55032025-03-07T23:30:11.979ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55042025-03-07T23:30:11.979ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55052025-03-07T23:30:11.980ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55062025-03-07T23:30:11.982ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55072025-03-07T23:30:11.982ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55082025-03-07T23:30:11.982ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55092025-03-07T23:30:11.983ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55102025-03-07T23:30:11.986ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55112025-03-07T23:30:11.986ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55122025-03-07T23:30:11.986ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55132025-03-07T23:30:11.987ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55142025-03-07T23:30:11.989ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55152025-03-07T23:30:11.999ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55162025-03-07T23:30:11.999ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55172025-03-07T23:30:11.999ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55182025-03-07T23:30:11.999ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55192025-03-07T23:30:12.002ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55202025-03-07T23:30:12.002ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55212025-03-07T23:30:12.003ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55222025-03-07T23:30:12.007ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55232025-03-07T23:30:12.007ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55242025-03-07T23:30:12.010ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55252025-03-07T23:30:12.013ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 93d2ae17-e561-4351-a047-46b3eccf5cb3, lookup_type: ById(93d2ae17-e561-4351-a047-46b3eccf5cb3) } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55262025-03-07T23:30:12.013ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55272025-03-07T23:30:12.013ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55282025-03-07T23:30:12.013ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55292025-03-07T23:30:12.013ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55302025-03-07T23:30:12.019ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55312025-03-07T23:30:12.019ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55322025-03-07T23:30:12.019ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55332025-03-07T23:30:12.024ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55342025-03-07T23:30:12.039ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55352025-03-07T23:30:12.040ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55362025-03-07T23:30:12.040ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55372025-03-07T23:30:12.041ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55382025-03-07T23:30:12.044ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55392025-03-07T23:30:12.065ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 93d2ae17-e561-4351-a047-46b3eccf5cb3, lookup_type: ById(93d2ae17-e561-4351-a047-46b3eccf5cb3) } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55402025-03-07T23:30:12.065ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55412025-03-07T23:30:12.065ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55422025-03-07T23:30:12.066ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcCreateGateway
55432025-03-07T23:30:12.074ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
55442025-03-07T23:30:12.075ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("93d2ae17-e561-4351-a047-46b3eccf5cb3"), "lookup_type": Object {"ById": String("93d2ae17-e561-4351-a047-46b3eccf5cb3")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 14 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
55452025-03-07T23:30:12.079ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
55462025-03-07T23:30:12.079ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
55472025-03-07T23:30:12.083ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55482025-03-07T23:30:12.083ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55492025-03-07T23:30:12.084ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55502025-03-07T23:30:12.089ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55512025-03-07T23:30:12.089ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55522025-03-07T23:30:12.090ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55532025-03-07T23:30:12.093ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55542025-03-07T23:30:12.093ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55552025-03-07T23:30:12.094ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55562025-03-07T23:30:12.098ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55572025-03-07T23:30:12.098ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55582025-03-07T23:30:12.098ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55592025-03-07T23:30:12.098ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55602025-03-07T23:30:12.099ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55612025-03-07T23:30:12.102ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55622025-03-07T23:30:12.102ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55632025-03-07T23:30:12.103ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55642025-03-07T23:30:12.103ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55652025-03-07T23:30:12.107ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55662025-03-07T23:30:12.107ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55672025-03-07T23:30:12.107ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55682025-03-07T23:30:12.108ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55692025-03-07T23:30:12.112ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55702025-03-07T23:30:12.128ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55712025-03-07T23:30:12.128ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55722025-03-07T23:30:12.128ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55732025-03-07T23:30:12.128ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55742025-03-07T23:30:12.129ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55752025-03-07T23:30:12.129ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55762025-03-07T23:30:12.136ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55772025-03-07T23:30:12.136ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55782025-03-07T23:30:12.136ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55792025-03-07T23:30:12.137ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55802025-03-07T23:30:12.145ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55812025-03-07T23:30:12.264ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55822025-03-07T23:30:12.264ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55832025-03-07T23:30:12.265ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55842025-03-07T23:30:12.265ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
55852025-03-07T23:30:12.266ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
55862025-03-07T23:30:12.267ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
55872025-03-07T23:30:12.270ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
55882025-03-07T23:30:12.280ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55892025-03-07T23:30:12.300ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55902025-03-07T23:30:12.300ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55912025-03-07T23:30:12.300ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55922025-03-07T23:30:12.301ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
55932025-03-07T23:30:12.302ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
55942025-03-07T23:30:12.302ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
55952025-03-07T23:30:12.310ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
55962025-03-07T23:30:12.310ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
55972025-03-07T23:30:12.311ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
55982025-03-07T23:30:12.312ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = []
55992025-03-07T23:30:12.312ZDEBGtest_unauthorized (nexus): resolved 0 rules for sleds
56002025-03-07T23:30:12.348ZDEBGtest_unauthorized (nexus): resolved sleds for vpc demo-vpc vpc_to_sled = []
56012025-03-07T23:30:12.348ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
56022025-03-07T23:30:12.348ZINFOtest_unauthorized (nexus): updated firewall rules on 0 sleds
56032025-03-07T23:30:12.348ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
56042025-03-07T23:30:12.348ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
56052025-03-07T23:30:12.349ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_node = VpcNotifySleds
56062025-03-07T23:30:12.353ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
56072025-03-07T23:30:12.353ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 15 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
56082025-03-07T23:30:12.378ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
56092025-03-07T23:30:12.379ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
56102025-03-07T23:30:12.379ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
56112025-03-07T23:30:12.392ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
56122025-03-07T23:30:12.392ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
56132025-03-07T23:30:12.395ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
56142025-03-07T23:30:12.395ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057
56152025-03-07T23:30:12.400ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
56162025-03-07T23:30:12.400ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = b62d1c42-0bad-4954-93e6-59d55bb9a057 saga_name = vpc-create saga_result = SagaResult { saga_id: b62d1c42-0bad-4954-93e6-59d55bb9a057, saga_log: SagaLog { saga_id: b62d1c42-0bad-4954-93e6-59d55bb9a057, unwinding: false, events: [N016 started, N016 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N017 started, N017 succeeded], node_status: {0: Succeeded(String("87a33bee-6823-4ee4-af90-76b9fec98b34")), 1: Succeeded(String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")), 2: Succeeded(String("e380af8b-ce8d-4023-84f4-f4091f0869af")), 3: Succeeded(String("d7a634b2-2d2b-4f72-bd1c-2fba91c3a152")), 4: Succeeded(String("81a0c9e9-9cb6-4316-9c26-f1deab7ebbed")), 5: Succeeded(String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")), 6: Succeeded(String("93d2ae17-e561-4351-a047-46b3eccf5cb3")), 7: Succeeded(Array [Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("demo-vpc"), "firewall_gen": Number(1), "identity": Object {"description": String(""), "id": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "name": String("demo-vpc"), "time_created": String("2025-03-07T23:30:11.571779Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.571779Z")}, "ipv6_prefix": String("fd6a:5fca:48dd::/48"), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "subnet_gen": Number(1), "system_router_id": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "vni": Number(13361673)}]), 8: Succeeded(Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Array [Object {"key": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "lookup_type": Object {"ById": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for demo-vpc"), "id": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "name": String("default"), "time_created": String("2025-03-07T23:30:11.868173Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.868173Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6a:5fca:48dd::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}]), 12: Succeeded(Object {"key": String("81a0c9e9-9cb6-4316-9c26-f1deab7ebbed"), "lookup_type": Object {"ById": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")}, "parent": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 13: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("54b375c2-c401-4875-80c5-a90ac79822a8"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:30:11.937602683Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937602683Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("74c3768e-c0e0-4855-ab71-7d10a7f05cbd"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:30:11.937618118Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937618118Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("e87149a4-2d49-4af5-90de-db4ee780256c"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:30:11.937625240Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937625240Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}]), 14: Succeeded(Object {"key": String("93d2ae17-e561-4351-a047-46b3eccf5cb3"), "lookup_type": Object {"ById": String("93d2ae17-e561-4351-a047-46b3eccf5cb3")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 15: Succeeded(Null), 16: Succeeded(Null), 17: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("93d2ae17-e561-4351-a047-46b3eccf5cb3"), "default_subnet_id": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "default_v4_route_id": String("e380af8b-ce8d-4023-84f4-f4091f0869af"), "default_v6_route_id": String("d7a634b2-2d2b-4f72-bd1c-2fba91c3a152"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("54b375c2-c401-4875-80c5-a90ac79822a8"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-07T23:30:11.937602683Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937602683Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("74c3768e-c0e0-4855-ab71-7d10a7f05cbd"), "name": String("allow-ssh"), "time_created": String("2025-03-07T23:30:11.937618118Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937618118Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("e87149a4-2d49-4af5-90de-db4ee780256c"), "name": String("allow-icmp"), "time_created": String("2025-03-07T23:30:11.937625240Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.937625240Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("demo-vpc")}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}], "gateway": Object {"key": String("93d2ae17-e561-4351-a047-46b3eccf5cb3"), "lookup_type": Object {"ById": String("93d2ae17-e561-4351-a047-46b3eccf5cb3")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "route": Object {"key": String("81a0c9e9-9cb6-4316-9c26-f1deab7ebbed"), "lookup_type": Object {"ById": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")}, "parent": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "lookup_type": Object {"ById": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for demo-vpc"), "id": String("bbe48cbe-7e84-4aeb-8bbb-9c8b2d22feb5"), "name": String("default"), "time_created": String("2025-03-07T23:30:11.868173Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.868173Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6a:5fca:48dd::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}], "subnet_route_id": String("81a0c9e9-9cb6-4316-9c26-f1deab7ebbed"), "system_router_id": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "vpc": Array [Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("demo-vpc"), "firewall_gen": Number(1), "identity": Object {"description": String(""), "id": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "name": String("demo-vpc"), "time_created": String("2025-03-07T23:30:11.571779Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:11.571779Z")}, "ipv6_prefix": String("fd6a:5fca:48dd::/48"), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "subnet_gen": Number(1), "system_router_id": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "vni": Number(13361673)}], "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")} }) }
56172025-03-07T23:30:12.401ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1086770 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b19508f6-7be8-4724-8992-e53f6fb686b4 response_code = 201 uri = /v1/vpcs?project=demo-project
56182025-03-07T23:30:12.401ZINFOtest_unauthorized (external client test context): client received response status = 201
56192025-03-07T23:30:12.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56202025-03-07T23:30:12.402ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56212025-03-07T23:30:12.402ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56222025-03-07T23:30:12.402ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56232025-03-07T23:30:12.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56242025-03-07T23:30:12.402ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56252025-03-07T23:30:12.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56262025-03-07T23:30:12.418ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56272025-03-07T23:30:12.418ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56282025-03-07T23:30:12.418ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56292025-03-07T23:30:12.425ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
56302025-03-07T23:30:12.425ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
56312025-03-07T23:30:12.425ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56322025-03-07T23:30:12.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56332025-03-07T23:30:12.426ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56342025-03-07T23:30:12.448ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
56352025-03-07T23:30:12.448ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56362025-03-07T23:30:12.448ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56372025-03-07T23:30:12.449ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56382025-03-07T23:30:12.484ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
56392025-03-07T23:30:12.538ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
56402025-03-07T23:30:12.538ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56412025-03-07T23:30:12.538ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56422025-03-07T23:30:12.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56432025-03-07T23:30:12.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
56442025-03-07T23:30:12.551ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
56452025-03-07T23:30:12.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56462025-03-07T23:30:12.551ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56472025-03-07T23:30:12.552ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56482025-03-07T23:30:12.558ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
56492025-03-07T23:30:12.558ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
56502025-03-07T23:30:12.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
56512025-03-07T23:30:12.559ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
56522025-03-07T23:30:12.565ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56532025-03-07T23:30:12.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56542025-03-07T23:30:12.567ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
56552025-03-07T23:30:12.573ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
56562025-03-07T23:30:12.573ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56572025-03-07T23:30:12.573ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56582025-03-07T23:30:12.573ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56592025-03-07T23:30:12.574ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56602025-03-07T23:30:12.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56612025-03-07T23:30:12.591ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56622025-03-07T23:30:12.593ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56632025-03-07T23:30:12.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56642025-03-07T23:30:12.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56652025-03-07T23:30:12.600ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56662025-03-07T23:30:12.603ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56672025-03-07T23:30:12.624ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56682025-03-07T23:30:12.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56692025-03-07T23:30:12.625ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56702025-03-07T23:30:12.631ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56712025-03-07T23:30:12.631ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56722025-03-07T23:30:12.631ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56732025-03-07T23:30:12.631ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56742025-03-07T23:30:12.633ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56752025-03-07T23:30:12.638ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56762025-03-07T23:30:12.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56772025-03-07T23:30:12.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56782025-03-07T23:30:12.639ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56792025-03-07T23:30:12.644ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56802025-03-07T23:30:12.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56812025-03-07T23:30:12.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56822025-03-07T23:30:12.645ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56832025-03-07T23:30:12.649ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56842025-03-07T23:30:12.671ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56852025-03-07T23:30:12.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56862025-03-07T23:30:12.671ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56872025-03-07T23:30:12.671ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56882025-03-07T23:30:12.676ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56892025-03-07T23:30:12.676ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56902025-03-07T23:30:12.678ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56912025-03-07T23:30:12.681ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56922025-03-07T23:30:12.681ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56932025-03-07T23:30:12.682ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56942025-03-07T23:30:12.685ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56952025-03-07T23:30:12.685ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56962025-03-07T23:30:12.686ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56972025-03-07T23:30:12.689ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ById(87a33bee-6823-4ee4-af90-76b9fec98b34) }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56982025-03-07T23:30:12.689ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
56992025-03-07T23:30:12.689ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57002025-03-07T23:30:12.689ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57012025-03-07T23:30:12.690ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57022025-03-07T23:30:12.693ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57032025-03-07T23:30:12.693ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57042025-03-07T23:30:12.694ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57052025-03-07T23:30:12.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57062025-03-07T23:30:12.700ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57072025-03-07T23:30:12.701ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57082025-03-07T23:30:12.701ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57092025-03-07T23:30:12.701ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57102025-03-07T23:30:12.708ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57112025-03-07T23:30:12.719ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ById(87a33bee-6823-4ee4-af90-76b9fec98b34) }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57122025-03-07T23:30:12.719ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create
57132025-03-07T23:30:12.719ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":7,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[6,0,null],[5,7,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcSubnetId","name":"subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateRouteId","name":"route_id"}},{"Action":{"action_name":"vpc_subnet_create.vpc_subnet_create_subnet","label":"VpcSubnetCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_subnet_create.vpc_subnet_create_sys_route","label":"VpcSubnetCreateSysRoute","name":"route"}},{"Action":{"action_name":"vpc_subnet_create.vpc_subnet_create_link_custom","label":"VpcSubnetCreateLinkCustom","name":"output"}},{"Action":{"action_name":"vpc_subnet_create.vpc_notify_rpw","label":"VpcNotifyRpw","name":"notified"}},{"Start":{"params":{"authz_system_router":{"key":"c769a46d-da15-4d3b-b278-6fcfce9fa9fe","lookup_type":{"ById":"c769a46d-da15-4d3b-b278-6fcfce9fa9fe"},"parent":{"key":"87a33bee-6823-4ee4-af90-76b9fec98b34","lookup_type":{"ById":"87a33bee-6823-4ee4-af90-76b9fec98b34"},"parent":{"key":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","lookup_type":{"ById":"581ba6bb-1990-42cd-9dc5-6371c2e527c7"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}}}},"authz_vpc":{"key":"87a33bee-6823-4ee4-af90-76b9fec98b34","lookup_type":{"ByName":"demo-vpc"},"parent":{"key":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","lookup_type":{"ByName":"demo-project"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}}},"custom_router":null,"potential_ipv6_blocks":["fd6a:5fca:48dd:3540::/64","fd6a:5fca:48dd:142f::/64","fd6a:5fca:48dd:bae8::/64"],"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}},"subnet_create":{"custom_router":null,"description":"","ipv4_block":"10.1.2.3/8","ipv6_block":null,"name":"demo-vpc-subnet"}}}},"End"]},"saga_name":"vpc-subnet-create","start_node":6} saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57142025-03-07T23:30:12.719ZINFOtest_unauthorized (SecStore): creating saga saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create
57152025-03-07T23:30:12.723ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create
57162025-03-07T23:30:12.723ZINFOtest_unauthorized (SEC): saga start saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57172025-03-07T23:30:12.723ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57182025-03-07T23:30:12.724ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57192025-03-07T23:30:12.727ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57202025-03-07T23:30:12.727ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57212025-03-07T23:30:12.730ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57222025-03-07T23:30:12.730ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57232025-03-07T23:30:12.734ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57242025-03-07T23:30:12.734ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("7fee65c7-bcd5-4732-821c-3270734c2cf8")) node_id = 0 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57252025-03-07T23:30:12.743ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57262025-03-07T23:30:12.743ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57272025-03-07T23:30:12.774ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57282025-03-07T23:30:12.774ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("69f4c67f-5888-4126-a718-454bcef857f5")) node_id = 1 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57292025-03-07T23:30:12.786ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57302025-03-07T23:30:12.786ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57312025-03-07T23:30:12.791ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57322025-03-07T23:30:12.792ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57332025-03-07T23:30:12.792ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57342025-03-07T23:30:12.807ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57352025-03-07T23:30:12.809ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57362025-03-07T23:30:12.857ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57372025-03-07T23:30:12.858ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57382025-03-07T23:30:12.858ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57392025-03-07T23:30:12.859ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57402025-03-07T23:30:12.864ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57412025-03-07T23:30:12.864ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57422025-03-07T23:30:12.864ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57432025-03-07T23:30:12.865ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57442025-03-07T23:30:12.876ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57452025-03-07T23:30:12.883ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSubnet
57462025-03-07T23:30:12.891ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57472025-03-07T23:30:12.891ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "lookup_type": Object {"ById": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:30:12.791105Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:12.791105Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd6a:5fca:48dd:3540::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}]) node_id = 2 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57482025-03-07T23:30:12.905ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57492025-03-07T23:30:12.905ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57502025-03-07T23:30:12.922ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ById(87a33bee-6823-4ee4-af90-76b9fec98b34) }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57512025-03-07T23:30:12.922ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57522025-03-07T23:30:12.922ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57532025-03-07T23:30:12.922ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57542025-03-07T23:30:12.923ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57552025-03-07T23:30:12.929ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57562025-03-07T23:30:12.929ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57572025-03-07T23:30:12.929ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57582025-03-07T23:30:12.930ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57592025-03-07T23:30:12.941ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57602025-03-07T23:30:12.941ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57612025-03-07T23:30:12.941ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57622025-03-07T23:30:12.941ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57632025-03-07T23:30:12.956ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57642025-03-07T23:30:12.969ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ById(87a33bee-6823-4ee4-af90-76b9fec98b34) }, key: c769a46d-da15-4d3b-b278-6fcfce9fa9fe, lookup_type: ById(c769a46d-da15-4d3b-b278-6fcfce9fa9fe) } result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57652025-03-07T23:30:12.969ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57662025-03-07T23:30:12.969ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57672025-03-07T23:30:12.970ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcSubnetCreateSysRoute
57682025-03-07T23:30:12.977ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57692025-03-07T23:30:12.977ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"key": String("69f4c67f-5888-4126-a718-454bcef857f5"), "lookup_type": Object {"ById": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")}, "parent": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ById": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ById": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 3 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57702025-03-07T23:30:12.979ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57712025-03-07T23:30:12.980ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57722025-03-07T23:30:12.982ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57732025-03-07T23:30:12.982ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:30:12.791105Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:12.791105Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd6a:5fca:48dd:3540::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}) node_id = 4 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57742025-03-07T23:30:12.986ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57752025-03-07T23:30:12.986ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57762025-03-07T23:30:12.988ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcNotifyRpw
57772025-03-07T23:30:12.988ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcNotifyRpw
57782025-03-07T23:30:12.990ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_node = VpcNotifyRpw
57792025-03-07T23:30:13.003ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57802025-03-07T23:30:13.003ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57812025-03-07T23:30:13.023ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57822025-03-07T23:30:13.023ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57832025-03-07T23:30:13.026ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57842025-03-07T23:30:13.026ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 7 saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57852025-03-07T23:30:13.028ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57862025-03-07T23:30:13.028ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba
57872025-03-07T23:30:13.032ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
57882025-03-07T23:30:13.033ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 719f042f-bf63-4b83-ae88-cd19c29253ba saga_name = vpc-subnet-create saga_result = SagaResult { saga_id: 719f042f-bf63-4b83-ae88-cd19c29253ba, saga_log: SagaLog { saga_id: 719f042f-bf63-4b83-ae88-cd19c29253ba, unwinding: false, events: [N006 started, N006 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N007 started, N007 succeeded], node_status: {0: Succeeded(String("7fee65c7-bcd5-4732-821c-3270734c2cf8")), 1: Succeeded(String("69f4c67f-5888-4126-a718-454bcef857f5")), 2: Succeeded(Array [Object {"key": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "lookup_type": Object {"ById": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:30:12.791105Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:12.791105Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd6a:5fca:48dd:3540::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}]), 3: Succeeded(Object {"key": String("69f4c67f-5888-4126-a718-454bcef857f5"), "lookup_type": Object {"ById": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")}, "parent": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ById": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ById": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 4: Succeeded(Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:30:12.791105Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:12.791105Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd6a:5fca:48dd:3540::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"notified": Null, "output": Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:30:12.791105Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:12.791105Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd6a:5fca:48dd:3540::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, "route": Object {"key": String("69f4c67f-5888-4126-a718-454bcef857f5"), "lookup_type": Object {"ById": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")}, "parent": Object {"key": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe"), "lookup_type": Object {"ById": String("c769a46d-da15-4d3b-b278-6fcfce9fa9fe")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ById": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ById": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route_id": String("69f4c67f-5888-4126-a718-454bcef857f5"), "subnet": Array [Object {"key": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "lookup_type": Object {"ById": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")}, "parent": Object {"key": String("87a33bee-6823-4ee4-af90-76b9fec98b34"), "lookup_type": Object {"ByName": String("demo-vpc")}, "parent": Object {"key": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "lookup_type": Object {"ByName": String("demo-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String(""), "id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8"), "name": String("demo-vpc-subnet"), "time_created": String("2025-03-07T23:30:12.791105Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:12.791105Z")}, "ipv4_block": String("10.1.2.3/8"), "ipv6_block": String("fd6a:5fca:48dd:3540::/64"), "rcgen": Number(1), "vpc_id": String("87a33bee-6823-4ee4-af90-76b9fec98b34")}], "subnet_id": String("7fee65c7-bcd5-4732-821c-3270734c2cf8")} }) }
57892025-03-07T23:30:13.033ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 2 reason = Signaled
57902025-03-07T23:30:13.033ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
57912025-03-07T23:30:13.033ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
57922025-03-07T23:30:13.033ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
57932025-03-07T23:30:13.033ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
57942025-03-07T23:30:13.033ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
57952025-03-07T23:30:13.034ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
57962025-03-07T23:30:13.034ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 632178 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b86f1383-1d79-4e5e-b3bd-49e88236997c response_code = 201 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
57972025-03-07T23:30:13.034ZINFOtest_unauthorized (external client test context): client received response status = 201
57982025-03-07T23:30:13.035ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
57992025-03-07T23:30:13.035ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58002025-03-07T23:30:13.035ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58012025-03-07T23:30:13.035ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58022025-03-07T23:30:13.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58032025-03-07T23:30:13.036ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58042025-03-07T23:30:13.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58052025-03-07T23:30:13.036ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
58062025-03-07T23:30:13.040ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
58072025-03-07T23:30:13.040ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
58082025-03-07T23:30:13.040ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58092025-03-07T23:30:13.040ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
58102025-03-07T23:30:13.040ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
58112025-03-07T23:30:13.041ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
58122025-03-07T23:30:13.042ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58132025-03-07T23:30:13.042ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58142025-03-07T23:30:13.042ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58152025-03-07T23:30:13.047ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
58162025-03-07T23:30:13.059ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
58172025-03-07T23:30:13.059ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
58182025-03-07T23:30:13.059ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
58192025-03-07T23:30:13.060ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
58202025-03-07T23:30:13.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
58212025-03-07T23:30:13.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58222025-03-07T23:30:13.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58232025-03-07T23:30:13.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58242025-03-07T23:30:13.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58252025-03-07T23:30:13.068ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58262025-03-07T23:30:13.068ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58272025-03-07T23:30:13.068ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58282025-03-07T23:30:13.068ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58292025-03-07T23:30:13.196ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
58302025-03-07T23:30:13.196ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
58312025-03-07T23:30:13.197ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:52308 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
58322025-03-07T23:30:13.197ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
58332025-03-07T23:30:13.197ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
58342025-03-07T23:30:13.197ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
58352025-03-07T23:30:13.198ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
58362025-03-07T23:30:13.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
58372025-03-07T23:30:13.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
58382025-03-07T23:30:13.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58392025-03-07T23:30:13.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58402025-03-07T23:30:13.205ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58412025-03-07T23:30:13.209ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:52308 req_id = eadb257c-36c2-4310-8adb-e65731180c3c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
58422025-03-07T23:30:13.209ZINFOtest_unauthorized (dropshot): request completed latency_us = 251 local_addr = [::1]:57532 method = GET remote_addr = [::1]:52308 req_id = eadb257c-36c2-4310-8adb-e65731180c3c response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
58432025-03-07T23:30:13.210ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
58442025-03-07T23:30:13.210ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
58452025-03-07T23:30:13.211ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "eadb257c-36c2-4310-8adb-e65731180c3c", "content-length": "2", "date": "Fri, 07 Mar 2025 23:30:12 GMT"} })
58462025-03-07T23:30:13.211ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
58472025-03-07T23:30:13.211ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
58482025-03-07T23:30:13.214ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
58492025-03-07T23:30:13.214ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
58502025-03-07T23:30:13.214ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58512025-03-07T23:30:13.214ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58522025-03-07T23:30:13.214ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58532025-03-07T23:30:13.214ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58542025-03-07T23:30:13.269ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58552025-03-07T23:30:13.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58562025-03-07T23:30:13.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
58572025-03-07T23:30:13.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58582025-03-07T23:30:13.272ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
58592025-03-07T23:30:13.272ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
58602025-03-07T23:30:13.273ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
58612025-03-07T23:30:13.277ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
58622025-03-07T23:30:13.277ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58632025-03-07T23:30:13.277ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58642025-03-07T23:30:13.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58652025-03-07T23:30:13.277ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58662025-03-07T23:30:13.310ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
58672025-03-07T23:30:13.310ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58682025-03-07T23:30:13.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58692025-03-07T23:30:13.311ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58702025-03-07T23:30:13.321ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58712025-03-07T23:30:13.321ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58722025-03-07T23:30:13.322ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58732025-03-07T23:30:13.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58742025-03-07T23:30:13.338ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58752025-03-07T23:30:13.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58762025-03-07T23:30:13.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58772025-03-07T23:30:13.339ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58782025-03-07T23:30:13.339ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
58792025-03-07T23:30:13.339ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
58802025-03-07T23:30:13.339ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52308 req_id = fccdb5c6-1e91-42a0-9195-b2f52095f385 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
58812025-03-07T23:30:13.340ZINFOtest_unauthorized (dropshot): request completed latency_us = 234 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52308 req_id = fccdb5c6-1e91-42a0-9195-b2f52095f385 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
58822025-03-07T23:30:13.340ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "fccdb5c6-1e91-42a0-9195-b2f52095f385", "date": "Fri, 07 Mar 2025 23:30:12 GMT"} })
58832025-03-07T23:30:13.342ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 308.811556ms iteration = 2 status = {}
58842025-03-07T23:30:13.342ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58852025-03-07T23:30:13.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58862025-03-07T23:30:13.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58872025-03-07T23:30:13.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58882025-03-07T23:30:13.353ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58892025-03-07T23:30:13.353ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58902025-03-07T23:30:13.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58912025-03-07T23:30:13.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58922025-03-07T23:30:13.363ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58932025-03-07T23:30:13.372ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58942025-03-07T23:30:13.372ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58952025-03-07T23:30:13.372ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58962025-03-07T23:30:13.372ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58972025-03-07T23:30:13.373ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58982025-03-07T23:30:13.375ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
58992025-03-07T23:30:13.384ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59002025-03-07T23:30:13.384ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59012025-03-07T23:30:13.384ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59022025-03-07T23:30:13.386ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59032025-03-07T23:30:13.394ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59042025-03-07T23:30:13.399ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59052025-03-07T23:30:13.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59062025-03-07T23:30:13.400ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59072025-03-07T23:30:13.414ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
59082025-03-07T23:30:13.414ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59092025-03-07T23:30:13.415ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fd987978-684a-4888-84e1-19b1b8b7923f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59102025-03-07T23:30:13.415ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fd987978-684a-4888-84e1-19b1b8b7923f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59112025-03-07T23:30:13.415ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fd987978-684a-4888-84e1-19b1b8b7923f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59122025-03-07T23:30:13.416ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fd987978-684a-4888-84e1-19b1b8b7923f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59132025-03-07T23:30:13.419ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59142025-03-07T23:30:13.434ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59152025-03-07T23:30:13.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59162025-03-07T23:30:13.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59172025-03-07T23:30:13.438ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59182025-03-07T23:30:13.439ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 23329 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = fd987978-684a-4888-84e1-19b1b8b7923f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59192025-03-07T23:30:13.439ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd987978-684a-4888-84e1-19b1b8b7923f", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:13 GMT"} })
59202025-03-07T23:30:13.439ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59212025-03-07T23:30:13.440ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 220f3e53-0ed4-4ebf-a43d-a2620897d3ce uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59222025-03-07T23:30:13.440ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 220f3e53-0ed4-4ebf-a43d-a2620897d3ce resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59232025-03-07T23:30:13.441ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 220f3e53-0ed4-4ebf-a43d-a2620897d3ce roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59242025-03-07T23:30:13.441ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 220f3e53-0ed4-4ebf-a43d-a2620897d3ce resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59252025-03-07T23:30:13.446ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5582 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 220f3e53-0ed4-4ebf-a43d-a2620897d3ce response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59262025-03-07T23:30:13.457ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "220f3e53-0ed4-4ebf-a43d-a2620897d3ce", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:13 GMT"} })
59272025-03-07T23:30:13.470ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
59282025-03-07T23:30:13.484ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59292025-03-07T23:30:13.492ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
59302025-03-07T23:30:13.508ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 473442 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ad311657-c071-4cf3-bf45-a665becd0b89 response_code = 201 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
59312025-03-07T23:30:13.509ZINFOtest_unauthorized (external client test context): client received response status = 201
59322025-03-07T23:30:13.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59332025-03-07T23:30:13.510ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59342025-03-07T23:30:13.510ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59352025-03-07T23:30:13.510ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59362025-03-07T23:30:13.510ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59372025-03-07T23:30:13.510ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59382025-03-07T23:30:13.511ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59392025-03-07T23:30:13.526ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59402025-03-07T23:30:13.526ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59412025-03-07T23:30:13.526ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59422025-03-07T23:30:13.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
59432025-03-07T23:30:13.533ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
59442025-03-07T23:30:13.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59452025-03-07T23:30:13.533ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59462025-03-07T23:30:13.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59472025-03-07T23:30:13.536ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
59482025-03-07T23:30:13.536ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59492025-03-07T23:30:13.536ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59502025-03-07T23:30:13.536ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59512025-03-07T23:30:13.556ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
59522025-03-07T23:30:13.575ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
59532025-03-07T23:30:13.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59542025-03-07T23:30:13.575ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59552025-03-07T23:30:13.577ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59562025-03-07T23:30:13.582ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59572025-03-07T23:30:13.582ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59582025-03-07T23:30:13.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
59592025-03-07T23:30:13.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
59602025-03-07T23:30:13.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59612025-03-07T23:30:13.584ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59622025-03-07T23:30:13.585ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59632025-03-07T23:30:13.586ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59642025-03-07T23:30:13.587ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59652025-03-07T23:30:13.587ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59662025-03-07T23:30:13.587ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59672025-03-07T23:30:13.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
59682025-03-07T23:30:13.594ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59692025-03-07T23:30:13.594ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
59702025-03-07T23:30:13.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59712025-03-07T23:30:13.599ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
59722025-03-07T23:30:13.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
59732025-03-07T23:30:13.603ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59742025-03-07T23:30:13.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59752025-03-07T23:30:13.603ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59762025-03-07T23:30:13.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59772025-03-07T23:30:13.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59782025-03-07T23:30:13.608ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59792025-03-07T23:30:13.608ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59802025-03-07T23:30:13.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59812025-03-07T23:30:13.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59822025-03-07T23:30:13.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59832025-03-07T23:30:13.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59842025-03-07T23:30:13.617ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59852025-03-07T23:30:13.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59862025-03-07T23:30:13.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59872025-03-07T23:30:13.629ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59882025-03-07T23:30:13.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59892025-03-07T23:30:13.629ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59902025-03-07T23:30:13.630ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59912025-03-07T23:30:13.637ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59922025-03-07T23:30:13.637ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59932025-03-07T23:30:13.637ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59942025-03-07T23:30:13.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59952025-03-07T23:30:13.646ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59962025-03-07T23:30:13.647ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59972025-03-07T23:30:13.647ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59982025-03-07T23:30:13.648ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
59992025-03-07T23:30:13.652ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60002025-03-07T23:30:13.661ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60012025-03-07T23:30:13.661ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60022025-03-07T23:30:13.662ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60032025-03-07T23:30:13.662ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60042025-03-07T23:30:13.662ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60052025-03-07T23:30:13.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60062025-03-07T23:30:13.686ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60072025-03-07T23:30:13.686ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60082025-03-07T23:30:13.687ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60092025-03-07T23:30:13.688ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60102025-03-07T23:30:13.694ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60112025-03-07T23:30:13.704ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60122025-03-07T23:30:13.705ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60132025-03-07T23:30:13.706ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60142025-03-07T23:30:13.712ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60152025-03-07T23:30:13.724ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60162025-03-07T23:30:13.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60172025-03-07T23:30:13.725ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60182025-03-07T23:30:13.725ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60192025-03-07T23:30:13.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60202025-03-07T23:30:13.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60212025-03-07T23:30:13.734ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60222025-03-07T23:30:13.740ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 3 reason = Signaled
60232025-03-07T23:30:13.740ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
60242025-03-07T23:30:13.740ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
60252025-03-07T23:30:13.740ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60262025-03-07T23:30:13.740ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60272025-03-07T23:30:13.740ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60282025-03-07T23:30:13.741ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60292025-03-07T23:30:13.742ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 231162 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6bfcb8a-cefd-4260-88f2-1cc2d603024b response_code = 201 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
60302025-03-07T23:30:13.742ZINFOtest_unauthorized (external client test context): client received response status = 201
60312025-03-07T23:30:13.743ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks?project=demo-project
60322025-03-07T23:30:13.743ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
60332025-03-07T23:30:13.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
60342025-03-07T23:30:13.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
60352025-03-07T23:30:13.750ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60362025-03-07T23:30:13.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60372025-03-07T23:30:13.750ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60382025-03-07T23:30:13.751ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60392025-03-07T23:30:13.753ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 uri = /v1/disks?project=demo-project
60402025-03-07T23:30:13.759ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 uri = /v1/disks?project=demo-project
60412025-03-07T23:30:13.759ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
60422025-03-07T23:30:13.759ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60432025-03-07T23:30:13.759ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60442025-03-07T23:30:13.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60452025-03-07T23:30:13.762ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
60462025-03-07T23:30:13.774ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
60472025-03-07T23:30:13.774ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60482025-03-07T23:30:13.777ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60492025-03-07T23:30:13.778ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60502025-03-07T23:30:13.803ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60512025-03-07T23:30:13.815ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60522025-03-07T23:30:13.815ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60532025-03-07T23:30:13.961ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
60542025-03-07T23:30:13.961ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
60552025-03-07T23:30:13.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
60562025-03-07T23:30:13.962ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
60572025-03-07T23:30:13.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60582025-03-07T23:30:13.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60592025-03-07T23:30:13.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60602025-03-07T23:30:13.963ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:64991 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
60612025-03-07T23:30:13.964ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:64991 req_id = 3045c0bd-d8b7-4644-952a-a2ac0e27ef56 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
60622025-03-07T23:30:13.967ZINFOtest_unauthorized (dropshot): request completed latency_us = 3476 local_addr = [::1]:57532 method = GET remote_addr = [::1]:64991 req_id = 3045c0bd-d8b7-4644-952a-a2ac0e27ef56 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
60632025-03-07T23:30:13.969ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "3045c0bd-d8b7-4644-952a-a2ac0e27ef56", "content-length": "2", "date": "Fri, 07 Mar 2025 23:30:13 GMT"} })
60642025-03-07T23:30:13.969ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
60652025-03-07T23:30:13.969ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
60662025-03-07T23:30:13.971ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
60672025-03-07T23:30:13.971ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60682025-03-07T23:30:13.971ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60692025-03-07T23:30:13.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60702025-03-07T23:30:13.972ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60712025-03-07T23:30:13.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
60722025-03-07T23:30:13.981ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
60732025-03-07T23:30:13.981ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60742025-03-07T23:30:13.981ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60752025-03-07T23:30:13.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60762025-03-07T23:30:13.985ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
60772025-03-07T23:30:13.985ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
60782025-03-07T23:30:13.985ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60792025-03-07T23:30:13.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60802025-03-07T23:30:13.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60812025-03-07T23:30:13.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
60822025-03-07T23:30:13.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
60832025-03-07T23:30:13.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
60842025-03-07T23:30:13.996ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
60852025-03-07T23:30:13.997ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
60862025-03-07T23:30:13.997ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
60872025-03-07T23:30:13.997ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:64991 req_id = 236b4302-1dcf-479e-af20-b003e28c27a1 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
60882025-03-07T23:30:14.002ZINFOtest_unauthorized (dropshot): request completed latency_us = 4628 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:64991 req_id = 236b4302-1dcf-479e-af20-b003e28c27a1 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
60892025-03-07T23:30:14.003ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "236b4302-1dcf-479e-af20-b003e28c27a1", "date": "Fri, 07 Mar 2025 23:30:13 GMT"} })
60902025-03-07T23:30:14.005ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 265.126693ms iteration = 3 status = {}
60912025-03-07T23:30:14.007ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
60922025-03-07T23:30:14.011ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
60932025-03-07T23:30:14.011ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 uri = /v1/disks?project=demo-project
60942025-03-07T23:30:14.011ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database uri = /v1/disks?project=demo-project
60952025-03-07T23:30:14.011ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60962025-03-07T23:30:14.011ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
60972025-03-07T23:30:14.022ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database uri = /v1/disks?project=demo-project
60982025-03-07T23:30:14.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
60992025-03-07T23:30:14.023ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
61002025-03-07T23:30:14.030ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
61012025-03-07T23:30:14.030ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
61022025-03-07T23:30:14.031ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database uri = /v1/disks?project=demo-project
61032025-03-07T23:30:14.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
61042025-03-07T23:30:14.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
61052025-03-07T23:30:14.043ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
61062025-03-07T23:30:14.043ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database uri = /v1/disks?project=demo-project
61072025-03-07T23:30:14.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
61082025-03-07T23:30:14.044ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
61092025-03-07T23:30:14.048ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
61102025-03-07T23:30:14.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database uri = /v1/disks?project=demo-project
61112025-03-07T23:30:14.048ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
61122025-03-07T23:30:14.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
61132025-03-07T23:30:14.051ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
61142025-03-07T23:30:14.060ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
61152025-03-07T23:30:14.060ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create
61162025-03-07T23:30:14.060ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":10,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[9,0,null],[8,10,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateDiskId","name":"disk_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVolumeId","name":"volume_id"}},{"Action":{"action_name":"disk_create.create_disk_record","label":"CreateDiskRecord","name":"created_disk"}},{"Action":{"action_name":"disk_create.regions_alloc","label":"RegionsAlloc","name":"datasets_and_regions"}},{"Action":{"action_name":"disk_create.space_account","label":"SpaceAccount","name":"no_result"}},{"Action":{"action_name":"disk_create.regions_ensure_undo","label":"RegionsEnsureUndo","name":"regions_ensure_undo"}},{"Action":{"action_name":"disk_create.regions_ensure","label":"RegionsEnsure","name":"regions_ensure"}},{"Action":{"action_name":"disk_create.create_volume_record","label":"CreateVolumeRecord","name":"created_volume"}},{"Action":{"action_name":"disk_create.finalize_disk_record","label":"FinalizeDiskRecord","name":"disk_runtime"}},{"Start":{"params":{"create_params":{"description":"","disk_source":{"block_size":4096,"type":"blank"},"name":"demo-disk","size":2147483648},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"disk-create","start_node":9} saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61172025-03-07T23:30:14.060ZINFOtest_unauthorized (SecStore): creating saga saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create
61182025-03-07T23:30:14.067ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create
61192025-03-07T23:30:14.067ZINFOtest_unauthorized (SEC): saga start saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61202025-03-07T23:30:14.068ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61212025-03-07T23:30:14.068ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61222025-03-07T23:30:14.070ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61232025-03-07T23:30:14.070ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61242025-03-07T23:30:14.077ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61252025-03-07T23:30:14.077ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61262025-03-07T23:30:14.081ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61272025-03-07T23:30:14.081ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34")) node_id = 0 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61282025-03-07T23:30:14.094ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61292025-03-07T23:30:14.094ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61302025-03-07T23:30:14.097ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61312025-03-07T23:30:14.098ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("7336c780-248b-4d0b-95db-8b80e349e06a")) node_id = 1 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61322025-03-07T23:30:14.100ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61332025-03-07T23:30:14.100ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61342025-03-07T23:30:14.108ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61352025-03-07T23:30:14.108ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61362025-03-07T23:30:14.111ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61372025-03-07T23:30:14.112ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61382025-03-07T23:30:14.112ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61392025-03-07T23:30:14.113ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61402025-03-07T23:30:14.115ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61412025-03-07T23:30:14.115ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61422025-03-07T23:30:14.115ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61432025-03-07T23:30:14.116ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61442025-03-07T23:30:14.117ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61452025-03-07T23:30:14.120ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61462025-03-07T23:30:14.120ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61472025-03-07T23:30:14.120ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61482025-03-07T23:30:14.121ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61492025-03-07T23:30:14.127ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61502025-03-07T23:30:14.127ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61512025-03-07T23:30:14.127ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61522025-03-07T23:30:14.127ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61532025-03-07T23:30:14.131ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61542025-03-07T23:30:14.147ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61552025-03-07T23:30:14.147ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61562025-03-07T23:30:14.147ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61572025-03-07T23:30:14.148ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61582025-03-07T23:30:14.148ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61592025-03-07T23:30:14.148ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61602025-03-07T23:30:14.153ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61612025-03-07T23:30:14.153ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61622025-03-07T23:30:14.153ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61632025-03-07T23:30:14.154ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61642025-03-07T23:30:14.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
61652025-03-07T23:30:14.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
61662025-03-07T23:30:14.158ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61672025-03-07T23:30:14.158ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61682025-03-07T23:30:14.158ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61692025-03-07T23:30:14.159ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61702025-03-07T23:30:14.159ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
61712025-03-07T23:30:14.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
61722025-03-07T23:30:14.163ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61732025-03-07T23:30:14.173ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61742025-03-07T23:30:14.174ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61752025-03-07T23:30:14.174ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61762025-03-07T23:30:14.185ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = CreateDiskRecord
61772025-03-07T23:30:14.202ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
61782025-03-07T23:30:14.202ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
61792025-03-07T23:30:14.207ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
61802025-03-07T23:30:14.207ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
61812025-03-07T23:30:14.261ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
61822025-03-07T23:30:14.265ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61832025-03-07T23:30:14.265ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "name": String("demo-disk"), "time_created": String("2025-03-07T23:30:14.108672Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:14.108672Z")}, "pantry_address": Null, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:30:14.108664Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}) node_id = 2 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61842025-03-07T23:30:14.275ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61852025-03-07T23:30:14.275ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61862025-03-07T23:30:14.283ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = RegionsAlloc
61872025-03-07T23:30:14.283ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = RegionsAlloc
61882025-03-07T23:30:14.284ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = RegionsAlloc
61892025-03-07T23:30:14.318ZINFOtest_unauthorized (datastore): Allocated regions for volume datasets_and_regions = [(CrucibleDataset { identity: CrucibleDatasetIdentity { id: 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset), time_created: 2025-03-07T23:30:05.411623Z, time_modified: 2025-03-07T23:30:05.411623Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 9dcb348c-3741-440e-ad18-bffcbe7ca303, ip: ::1, port: SqlU16(47503), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 04f562df-dec8-41e2-b074-39178787c4ac, time_created: 2025-03-07T23:30:14.299097Z, time_modified: 2025-03-07T23:30:14.299097Z }, dataset_id: 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset), volume_id: 7336c780-248b-4d0b-95db-8b80e349e06a (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset), time_created: 2025-03-07T23:30:03.742942Z, time_modified: 2025-03-07T23:30:03.742942Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 72fa80df-1134-4c26-8f56-47af05a6836f, ip: ::1, port: SqlU16(36988), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 741ff649-473a-4388-9d23-76690a400f66, time_created: 2025-03-07T23:30:14.299097Z, time_modified: 2025-03-07T23:30:14.299097Z }, dataset_id: 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset), volume_id: 7336c780-248b-4d0b-95db-8b80e349e06a (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset), time_created: 2025-03-07T23:30:07.282286Z, time_modified: 2025-03-07T23:30:07.282286Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f, ip: ::1, port: SqlU16(63315), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 2f6a275c-2a15-4e29-b1f5-1396e4e98387, time_created: 2025-03-07T23:30:14.299097Z, time_modified: 2025-03-07T23:30:14.299097Z }, dataset_id: c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset), volume_id: 7336c780-248b-4d0b-95db-8b80e349e06a (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false })] maybe_snapshot_id = None volume_id = 7336c780-248b-4d0b-95db-8b80e349e06a
61902025-03-07T23:30:14.319ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61912025-03-07T23:30:14.319ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Array [Object {"identity": Object {"id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "time_created": String("2025-03-07T23:30:05.411623Z"), "time_modified": String("2025-03-07T23:30:05.411623Z")}, "ip": String("::1"), "pool_id": String("9dcb348c-3741-440e-ad18-bffcbe7ca303"), "port": Number(47503), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("04f562df-dec8-41e2-b074-39178787c4ac"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}], Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("741ff649-473a-4388-9d23-76690a400f66"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("2f6a275c-2a15-4e29-b1f5-1396e4e98387"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}]]) node_id = 3 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61922025-03-07T23:30:14.323ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61932025-03-07T23:30:14.324ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61942025-03-07T23:30:14.328ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = SpaceAccount
61952025-03-07T23:30:14.328ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = SpaceAccount
61962025-03-07T23:30:14.329ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = SpaceAccount
61972025-03-07T23:30:14.343ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
61982025-03-07T23:30:14.343ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
61992025-03-07T23:30:14.347ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62002025-03-07T23:30:14.347ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62012025-03-07T23:30:14.359ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62022025-03-07T23:30:14.360ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62032025-03-07T23:30:14.365ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62042025-03-07T23:30:14.365ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62052025-03-07T23:30:14.391ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:36988 remote_addr = [::1]:57120 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
62062025-03-07T23:30:14.392ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:47503 remote_addr = [::1]:39737 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
62072025-03-07T23:30:14.392ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = 77ed712b-cc84-4c51-b2d0-19315f5df1b1 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
62082025-03-07T23:30:14.393ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:47503 method = POST remote_addr = [::1]:39737 req_id = 75707c03-47d3-4771-b71a-eefbe06697af server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
62092025-03-07T23:30:14.393ZINFOtest_unauthorized (SledAgent): created region 741ff649-473a-4388-9d23-76690a400f66 end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
62102025-03-07T23:30:14.393ZINFOtest_unauthorized (SledAgent): created region 04f562df-dec8-41e2-b074-39178787c4ac end_port = 1100 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1050
62112025-03-07T23:30:14.393ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 761 local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = 77ed712b-cc84-4c51-b2d0-19315f5df1b1 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
62122025-03-07T23:30:14.393ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 643 local_addr = [::1]:47503 method = POST remote_addr = [::1]:39737 req_id = 75707c03-47d3-4771-b71a-eefbe06697af response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
62132025-03-07T23:30:14.395ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:63315 remote_addr = [::1]:44471 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
62142025-03-07T23:30:14.397ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = a1266b25-614c-4168-955e-8f23f308a045 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
62152025-03-07T23:30:14.397ZINFOtest_unauthorized (SledAgent): created region 2f6a275c-2a15-4e29-b1f5-1396e4e98387 end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
62162025-03-07T23:30:14.397ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 191 local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = a1266b25-614c-4168-955e-8f23f308a045 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
62172025-03-07T23:30:14.404ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62182025-03-07T23:30:14.405ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": Number(4096), "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "key": String("aHRvBtSrmX+Ss8jDrwCsC1upoqbnvRZ3qSDS00uAEhw="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1050"), String("[::1]:1000"), String("[::1]:1150")]}, "type": String("region")}], "type": String("volume")}) node_id = 6 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62192025-03-07T23:30:14.412ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62202025-03-07T23:30:14.412ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62212025-03-07T23:30:14.462ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62222025-03-07T23:30:14.462ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 7 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62232025-03-07T23:30:14.465ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62242025-03-07T23:30:14.466ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62252025-03-07T23:30:14.469ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62262025-03-07T23:30:14.469ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62272025-03-07T23:30:14.470ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62282025-03-07T23:30:14.474ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62292025-03-07T23:30:14.474ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62302025-03-07T23:30:14.475ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62312025-03-07T23:30:14.477ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62322025-03-07T23:30:14.477ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62332025-03-07T23:30:14.477ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62342025-03-07T23:30:14.482ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62352025-03-07T23:30:14.482ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62362025-03-07T23:30:14.482ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62372025-03-07T23:30:14.482ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62382025-03-07T23:30:14.483ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62392025-03-07T23:30:14.489ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62402025-03-07T23:30:14.489ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62412025-03-07T23:30:14.489ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62422025-03-07T23:30:14.490ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62432025-03-07T23:30:14.495ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62442025-03-07T23:30:14.495ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62452025-03-07T23:30:14.495ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62462025-03-07T23:30:14.496ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62472025-03-07T23:30:14.503ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62482025-03-07T23:30:14.514ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62492025-03-07T23:30:14.514ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62502025-03-07T23:30:14.514ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62512025-03-07T23:30:14.514ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62522025-03-07T23:30:14.514ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62532025-03-07T23:30:14.519ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62542025-03-07T23:30:14.523ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62552025-03-07T23:30:14.524ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62562025-03-07T23:30:14.524ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62572025-03-07T23:30:14.524ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62582025-03-07T23:30:14.528ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62592025-03-07T23:30:14.528ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62602025-03-07T23:30:14.528ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62612025-03-07T23:30:14.528ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62622025-03-07T23:30:14.531ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62632025-03-07T23:30:14.539ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62642025-03-07T23:30:14.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62652025-03-07T23:30:14.540ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62662025-03-07T23:30:14.542ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_node = FinalizeDiskRecord
62672025-03-07T23:30:14.550ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62682025-03-07T23:30:14.550ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62692025-03-07T23:30:14.553ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62702025-03-07T23:30:14.553ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62712025-03-07T23:30:14.555ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62722025-03-07T23:30:14.555ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62732025-03-07T23:30:14.558ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62742025-03-07T23:30:14.558ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f
62752025-03-07T23:30:14.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
62762025-03-07T23:30:14.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
62772025-03-07T23:30:14.562ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
62782025-03-07T23:30:14.562ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 0670ff9c-6924-4d57-94db-8c7bb719c74f saga_name = disk-create saga_result = SagaResult { saga_id: 0670ff9c-6924-4d57-94db-8c7bb719c74f, saga_log: SagaLog { saga_id: 0670ff9c-6924-4d57-94db-8c7bb719c74f, unwinding: false, events: [N009 started, N009 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N010 started, N010 succeeded], node_status: {0: Succeeded(String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34")), 1: Succeeded(String("7336c780-248b-4d0b-95db-8b80e349e06a")), 2: Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "name": String("demo-disk"), "time_created": String("2025-03-07T23:30:14.108672Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:14.108672Z")}, "pantry_address": Null, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:30:14.108664Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}), 3: Succeeded(Array [Array [Object {"identity": Object {"id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "time_created": String("2025-03-07T23:30:05.411623Z"), "time_modified": String("2025-03-07T23:30:05.411623Z")}, "ip": String("::1"), "pool_id": String("9dcb348c-3741-440e-ad18-bffcbe7ca303"), "port": Number(47503), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("04f562df-dec8-41e2-b074-39178787c4ac"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}], Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("741ff649-473a-4388-9d23-76690a400f66"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("2f6a275c-2a15-4e29-b1f5-1396e4e98387"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}]]), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Object {"block_size": Number(4096), "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "key": String("aHRvBtSrmX+Ss8jDrwCsC1upoqbnvRZ3qSDS00uAEhw="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1050"), String("[::1]:1000"), String("[::1]:1150")]}, "type": String("region")}], "type": String("volume")}), 7: Succeeded(Null), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"created_disk": Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "name": String("demo-disk"), "time_created": String("2025-03-07T23:30:14.108672Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:14.108672Z")}, "pantry_address": Null, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:30:14.108664Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}, "created_volume": Null, "datasets_and_regions": Array [Array [Object {"identity": Object {"id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "time_created": String("2025-03-07T23:30:05.411623Z"), "time_modified": String("2025-03-07T23:30:05.411623Z")}, "ip": String("::1"), "pool_id": String("9dcb348c-3741-440e-ad18-bffcbe7ca303"), "port": Number(47503), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("04f562df-dec8-41e2-b074-39178787c4ac"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}], Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("741ff649-473a-4388-9d23-76690a400f66"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("2f6a275c-2a15-4e29-b1f5-1396e4e98387"), "time_created": String("2025-03-07T23:30:14.299097Z"), "time_modified": String("2025-03-07T23:30:14.299097Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")}]], "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "disk_runtime": Null, "no_result": Null, "regions_ensure": Object {"block_size": Number(4096), "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "key": String("aHRvBtSrmX+Ss8jDrwCsC1upoqbnvRZ3qSDS00uAEhw="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1050"), String("[::1]:1000"), String("[::1]:1150")]}, "type": String("region")}], "type": String("volume")}, "regions_ensure_undo": Null, "volume_id": String("7336c780-248b-4d0b-95db-8b80e349e06a")} }) }
62792025-03-07T23:30:14.563ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 809453 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aae3b0f3-7ff8-4485-bf75-0b83369fa314 response_code = 201 uri = /v1/disks?project=demo-project
62802025-03-07T23:30:14.564ZINFOtest_unauthorized (external client test context): client received response status = 201
62812025-03-07T23:30:14.565ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks?project=demo-project
62822025-03-07T23:30:14.565ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
62832025-03-07T23:30:14.567ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
62842025-03-07T23:30:14.567ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
62852025-03-07T23:30:14.567ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
62862025-03-07T23:30:14.568ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd uri = /v1/disks?project=demo-project
62872025-03-07T23:30:14.568ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd uri = /v1/disks?project=demo-project
62882025-03-07T23:30:14.568ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
62892025-03-07T23:30:14.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62902025-03-07T23:30:14.568ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62912025-03-07T23:30:14.570ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62922025-03-07T23:30:14.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62932025-03-07T23:30:14.571ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62942025-03-07T23:30:14.572ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62952025-03-07T23:30:14.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
62962025-03-07T23:30:14.575ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
62972025-03-07T23:30:14.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62982025-03-07T23:30:14.575ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
62992025-03-07T23:30:14.576ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63002025-03-07T23:30:14.578ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
63012025-03-07T23:30:14.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63022025-03-07T23:30:14.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
63032025-03-07T23:30:14.579ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63042025-03-07T23:30:14.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
63052025-03-07T23:30:14.585ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
63062025-03-07T23:30:14.586ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63072025-03-07T23:30:14.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
63082025-03-07T23:30:14.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63092025-03-07T23:30:14.588ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
63102025-03-07T23:30:14.588ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
63112025-03-07T23:30:14.588ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63122025-03-07T23:30:14.588ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
63132025-03-07T23:30:14.589ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63142025-03-07T23:30:14.591ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
63152025-03-07T23:30:14.591ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63162025-03-07T23:30:14.591ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
63172025-03-07T23:30:14.591ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63182025-03-07T23:30:14.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
63192025-03-07T23:30:14.597ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
63202025-03-07T23:30:14.597ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd uri = /v1/disks?project=demo-project
63212025-03-07T23:30:14.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database uri = /v1/disks?project=demo-project
63222025-03-07T23:30:14.600ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63232025-03-07T23:30:14.601ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63242025-03-07T23:30:14.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database uri = /v1/disks?project=demo-project
63252025-03-07T23:30:14.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63262025-03-07T23:30:14.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63272025-03-07T23:30:14.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
63282025-03-07T23:30:14.607ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
63292025-03-07T23:30:14.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database uri = /v1/disks?project=demo-project
63302025-03-07T23:30:14.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63312025-03-07T23:30:14.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63322025-03-07T23:30:14.610ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
63332025-03-07T23:30:14.610ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database uri = /v1/disks?project=demo-project
63342025-03-07T23:30:14.610ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63352025-03-07T23:30:14.610ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63362025-03-07T23:30:14.613ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
63372025-03-07T23:30:14.613ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database uri = /v1/disks?project=demo-project
63382025-03-07T23:30:14.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
63392025-03-07T23:30:14.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
63402025-03-07T23:30:14.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
63412025-03-07T23:30:14.624ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
63422025-03-07T23:30:14.624ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create
63432025-03-07T23:30:14.625ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":12,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[11,0,null],[10,12,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateDiskId","name":"disk_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVolumeId","name":"volume_id"}},{"Action":{"action_name":"disk_create.create_disk_record","label":"CreateDiskRecord","name":"created_disk"}},{"Action":{"action_name":"disk_create.regions_alloc","label":"RegionsAlloc","name":"datasets_and_regions"}},{"Action":{"action_name":"disk_create.space_account","label":"SpaceAccount","name":"no_result"}},{"Action":{"action_name":"disk_create.regions_ensure_undo","label":"RegionsEnsureUndo","name":"regions_ensure_undo"}},{"Action":{"action_name":"disk_create.regions_ensure","label":"RegionsEnsure","name":"regions_ensure"}},{"Action":{"action_name":"disk_create.create_volume_record","label":"CreateVolumeRecord","name":"created_volume"}},{"Action":{"action_name":"disk_create.finalize_disk_record","label":"FinalizeDiskRecord","name":"disk_runtime"}},{"Action":{"action_name":"disk_create.get_pantry_address","label":"GetPantryAddress","name":"pantry_address"}},{"Action":{"action_name":"disk_create.call_pantry_attach_for_disk","label":"CallPantryAttachForDisk","name":"call_pantry_attach_for_disk"}},{"Start":{"params":{"create_params":{"description":"","disk_source":{"block_size":4096,"type":"importing_blocks"},"name":"demo-import-disk","size":2147483648},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"disk-create","start_node":11} saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63442025-03-07T23:30:14.625ZINFOtest_unauthorized (SecStore): creating saga saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create
63452025-03-07T23:30:14.628ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create
63462025-03-07T23:30:14.628ZINFOtest_unauthorized (SEC): saga start saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63472025-03-07T23:30:14.628ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63482025-03-07T23:30:14.628ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63492025-03-07T23:30:14.631ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63502025-03-07T23:30:14.631ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 11 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63512025-03-07T23:30:14.634ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63522025-03-07T23:30:14.634ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63532025-03-07T23:30:14.637ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63542025-03-07T23:30:14.637ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("b3a45edc-9cb4-4b82-adf1-62d15bef5089")) node_id = 0 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63552025-03-07T23:30:14.641ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63562025-03-07T23:30:14.642ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63572025-03-07T23:30:14.645ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63582025-03-07T23:30:14.646ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")) node_id = 1 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63592025-03-07T23:30:14.665ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
63602025-03-07T23:30:14.665ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
63612025-03-07T23:30:14.675ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63622025-03-07T23:30:14.675ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63632025-03-07T23:30:14.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63642025-03-07T23:30:14.683ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63652025-03-07T23:30:14.683ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63662025-03-07T23:30:14.684ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63672025-03-07T23:30:14.689ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63682025-03-07T23:30:14.689ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63692025-03-07T23:30:14.689ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63702025-03-07T23:30:14.689ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63712025-03-07T23:30:14.690ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63722025-03-07T23:30:14.694ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63732025-03-07T23:30:14.694ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63742025-03-07T23:30:14.694ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63752025-03-07T23:30:14.695ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63762025-03-07T23:30:14.700ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63772025-03-07T23:30:14.700ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63782025-03-07T23:30:14.701ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63792025-03-07T23:30:14.701ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63802025-03-07T23:30:14.704ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63812025-03-07T23:30:14.712ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63822025-03-07T23:30:14.712ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63832025-03-07T23:30:14.712ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63842025-03-07T23:30:14.712ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63852025-03-07T23:30:14.712ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63862025-03-07T23:30:14.713ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63872025-03-07T23:30:14.717ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63882025-03-07T23:30:14.717ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63892025-03-07T23:30:14.717ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63902025-03-07T23:30:14.718ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63912025-03-07T23:30:14.720ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63922025-03-07T23:30:14.720ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63932025-03-07T23:30:14.721ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63942025-03-07T23:30:14.724ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63952025-03-07T23:30:14.734ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63962025-03-07T23:30:14.746ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63972025-03-07T23:30:14.746ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63982025-03-07T23:30:14.746ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
63992025-03-07T23:30:14.747ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CreateDiskRecord
64002025-03-07T23:30:14.756ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64012025-03-07T23:30:14.756ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "name": String("demo-import-disk"), "time_created": String("2025-03-07T23:30:14.673199Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:14.673199Z")}, "pantry_address": Null, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:30:14.673198Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}) node_id = 2 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64022025-03-07T23:30:14.759ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64032025-03-07T23:30:14.760ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64042025-03-07T23:30:14.767ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = RegionsAlloc
64052025-03-07T23:30:14.767ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = RegionsAlloc
64062025-03-07T23:30:14.768ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = RegionsAlloc
64072025-03-07T23:30:14.811ZINFOtest_unauthorized (datastore): Allocated regions for volume datasets_and_regions = [(CrucibleDataset { identity: CrucibleDatasetIdentity { id: 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset), time_created: 2025-03-07T23:30:03.742942Z, time_modified: 2025-03-07T23:30:03.742942Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 72fa80df-1134-4c26-8f56-47af05a6836f, ip: ::1, port: SqlU16(36988), size_used: 4294967296 }, Region { identity: RegionIdentity { id: 28bacd20-7953-4b4b-bdab-0a111b494e82, time_created: 2025-03-07T23:30:14.788229Z, time_modified: 2025-03-07T23:30:14.788229Z }, dataset_id: 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset), volume_id: 5a6276b9-822e-4faa-8b4a-137ae2c53b48 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset), time_created: 2025-03-07T23:30:07.282286Z, time_modified: 2025-03-07T23:30:07.282286Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f, ip: ::1, port: SqlU16(63315), size_used: 4294967296 }, Region { identity: RegionIdentity { id: 747fdcb4-2d31-45ec-9ff5-f6b6f5675f89, time_created: 2025-03-07T23:30:14.788229Z, time_modified: 2025-03-07T23:30:14.788229Z }, dataset_id: c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset), volume_id: 5a6276b9-822e-4faa-8b4a-137ae2c53b48 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: e623ce6a-105d-42bb-89b1-f0546be9ed27 (dataset), time_created: 2025-03-07T23:30:06.145318Z, time_modified: 2025-03-07T23:30:06.145318Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: d150ed47-35a1-423a-b216-759535a68878, ip: ::1, port: SqlU16(45686), size_used: 2147483648 }, Region { identity: RegionIdentity { id: 5b3ea644-3f93-49a2-b626-f3ebe852781b, time_created: 2025-03-07T23:30:14.788229Z, time_modified: 2025-03-07T23:30:14.788229Z }, dataset_id: e623ce6a-105d-42bb-89b1-f0546be9ed27 (dataset), volume_id: 5a6276b9-822e-4faa-8b4a-137ae2c53b48 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false })] maybe_snapshot_id = None volume_id = 5a6276b9-822e-4faa-8b4a-137ae2c53b48
64082025-03-07T23:30:14.811ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64092025-03-07T23:30:14.811ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("28bacd20-7953-4b4b-bdab-0a111b494e82"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("747fdcb4-2d31-45ec-9ff5-f6b6f5675f89"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}], Array [Object {"identity": Object {"id": String("e623ce6a-105d-42bb-89b1-f0546be9ed27"), "time_created": String("2025-03-07T23:30:06.145318Z"), "time_modified": String("2025-03-07T23:30:06.145318Z")}, "ip": String("::1"), "pool_id": String("d150ed47-35a1-423a-b216-759535a68878"), "port": Number(45686), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e623ce6a-105d-42bb-89b1-f0546be9ed27"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("5b3ea644-3f93-49a2-b626-f3ebe852781b"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}]]) node_id = 3 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64102025-03-07T23:30:14.821ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64112025-03-07T23:30:14.821ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64122025-03-07T23:30:14.825ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = SpaceAccount
64132025-03-07T23:30:14.825ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = SpaceAccount
64142025-03-07T23:30:14.825ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = SpaceAccount
64152025-03-07T23:30:14.836ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64162025-03-07T23:30:14.836ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64172025-03-07T23:30:14.839ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64182025-03-07T23:30:14.839ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64192025-03-07T23:30:14.842ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64202025-03-07T23:30:14.842ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64212025-03-07T23:30:14.845ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64222025-03-07T23:30:14.845ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64232025-03-07T23:30:14.854ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): accepted connection kind = storage local_addr = [::1]:45686 remote_addr = [::1]:43534 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
64242025-03-07T23:30:14.854ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = 061cfec4-deb6-4ed8-a5e0-fc4f760b7d19 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64252025-03-07T23:30:14.854ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = 4730b529-b19e-42a7-b804-2ca8bedeb799 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64262025-03-07T23:30:14.855ZINFOtest_unauthorized (SledAgent): created region 28bacd20-7953-4b4b-bdab-0a111b494e82 end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
64272025-03-07T23:30:14.855ZINFOtest_unauthorized (SledAgent): created region 747fdcb4-2d31-45ec-9ff5-f6b6f5675f89 end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
64282025-03-07T23:30:14.855ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 659 local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = 061cfec4-deb6-4ed8-a5e0-fc4f760b7d19 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64292025-03-07T23:30:14.855ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 710 local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = 4730b529-b19e-42a7-b804-2ca8bedeb799 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64302025-03-07T23:30:14.855ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:45686 method = POST remote_addr = [::1]:43534 req_id = b3acee5b-9c64-46bd-ae48-9c735a5f6116 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64312025-03-07T23:30:14.856ZINFOtest_unauthorized (SledAgent): created region 5b3ea644-3f93-49a2-b626-f3ebe852781b end_port = 1150 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1100
64322025-03-07T23:30:14.856ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 538 local_addr = [::1]:45686 method = POST remote_addr = [::1]:43534 req_id = b3acee5b-9c64-46bd-ae48-9c735a5f6116 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
64332025-03-07T23:30:14.863ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64342025-03-07T23:30:14.863ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": Number(4096), "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "key": String("QKwMGwAoOOGFssRZilx5w8KQd1eVBPTEmqaPL14d25M="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1151"), String("[::1]:1001"), String("[::1]:1100")]}, "type": String("region")}], "type": String("volume")}) node_id = 6 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64352025-03-07T23:30:14.867ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64362025-03-07T23:30:14.867ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64372025-03-07T23:30:14.895ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64382025-03-07T23:30:14.896ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 7 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64392025-03-07T23:30:14.899ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64402025-03-07T23:30:14.899ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64412025-03-07T23:30:14.902ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64422025-03-07T23:30:14.902ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64432025-03-07T23:30:14.902ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64442025-03-07T23:30:14.908ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64452025-03-07T23:30:14.908ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64462025-03-07T23:30:14.908ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64472025-03-07T23:30:14.910ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64482025-03-07T23:30:14.911ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64492025-03-07T23:30:14.912ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64502025-03-07T23:30:14.913ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64512025-03-07T23:30:14.914ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64522025-03-07T23:30:14.914ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64532025-03-07T23:30:14.914ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64542025-03-07T23:30:14.914ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64552025-03-07T23:30:14.917ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64562025-03-07T23:30:14.917ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64572025-03-07T23:30:14.917ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64582025-03-07T23:30:14.918ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64592025-03-07T23:30:14.921ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64602025-03-07T23:30:14.921ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64612025-03-07T23:30:14.921ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64622025-03-07T23:30:14.922ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64632025-03-07T23:30:14.925ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64642025-03-07T23:30:14.932ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64652025-03-07T23:30:14.932ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64662025-03-07T23:30:14.932ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64672025-03-07T23:30:14.932ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64682025-03-07T23:30:14.932ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64692025-03-07T23:30:14.933ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64702025-03-07T23:30:14.936ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64712025-03-07T23:30:14.936ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64722025-03-07T23:30:14.936ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64732025-03-07T23:30:14.937ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64742025-03-07T23:30:14.940ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64752025-03-07T23:30:14.940ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64762025-03-07T23:30:14.940ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64772025-03-07T23:30:14.941ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64782025-03-07T23:30:14.945ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64792025-03-07T23:30:14.954ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64802025-03-07T23:30:14.954ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64812025-03-07T23:30:14.954ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64822025-03-07T23:30:14.955ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = FinalizeDiskRecord
64832025-03-07T23:30:14.960ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64842025-03-07T23:30:14.960ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64852025-03-07T23:30:14.963ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
64862025-03-07T23:30:14.963ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
64872025-03-07T23:30:14.965ZINFOtest_unauthorized (SagaExecutor): using pantry at [::1]:37181 for importing to disk b3a45edc-9cb4-4b82-adf1-62d15bef5089 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create
64882025-03-07T23:30:14.966ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64892025-03-07T23:30:14.966ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64902025-03-07T23:30:14.966ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64912025-03-07T23:30:14.968ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = f232cd21-1e7a-4929-af55-7303378677fd sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
64922025-03-07T23:30:14.968ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 190 local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = f232cd21-1e7a-4929-af55-7303378677fd response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
64932025-03-07T23:30:14.968ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64942025-03-07T23:30:14.969ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64952025-03-07T23:30:14.969ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64962025-03-07T23:30:14.971ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64972025-03-07T23:30:14.971ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64982025-03-07T23:30:14.971ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
64992025-03-07T23:30:14.973ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65002025-03-07T23:30:14.973ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65012025-03-07T23:30:14.973ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65022025-03-07T23:30:14.973ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65032025-03-07T23:30:14.974ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65042025-03-07T23:30:14.976ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65052025-03-07T23:30:14.976ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65062025-03-07T23:30:14.976ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65072025-03-07T23:30:14.977ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65082025-03-07T23:30:14.981ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65092025-03-07T23:30:14.981ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65102025-03-07T23:30:14.981ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65112025-03-07T23:30:14.981ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65122025-03-07T23:30:14.989ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65132025-03-07T23:30:14.995ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65142025-03-07T23:30:14.995ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65152025-03-07T23:30:14.995ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65162025-03-07T23:30:14.995ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65172025-03-07T23:30:14.996ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65182025-03-07T23:30:14.996ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65192025-03-07T23:30:15.003ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65202025-03-07T23:30:15.004ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65212025-03-07T23:30:15.004ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65222025-03-07T23:30:15.004ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65232025-03-07T23:30:15.009ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65242025-03-07T23:30:15.009ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65252025-03-07T23:30:15.009ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65262025-03-07T23:30:15.009ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65272025-03-07T23:30:15.015ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65282025-03-07T23:30:15.019ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65292025-03-07T23:30:15.019ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65302025-03-07T23:30:15.019ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65312025-03-07T23:30:15.020ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = GetPantryAddress
65322025-03-07T23:30:15.027ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65332025-03-07T23:30:15.027ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("[::1]:37181")) node_id = 9 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
65342025-03-07T23:30:15.030ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65352025-03-07T23:30:15.030ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
65362025-03-07T23:30:15.032ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65372025-03-07T23:30:15.032ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65382025-03-07T23:30:15.033ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65392025-03-07T23:30:15.042ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65402025-03-07T23:30:15.042ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65412025-03-07T23:30:15.042ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65422025-03-07T23:30:15.044ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65432025-03-07T23:30:15.044ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65442025-03-07T23:30:15.045ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65452025-03-07T23:30:15.047ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65462025-03-07T23:30:15.047ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65472025-03-07T23:30:15.047ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65482025-03-07T23:30:15.047ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65492025-03-07T23:30:15.047ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65502025-03-07T23:30:15.050ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65512025-03-07T23:30:15.050ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65522025-03-07T23:30:15.050ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65532025-03-07T23:30:15.051ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65542025-03-07T23:30:15.068ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65552025-03-07T23:30:15.069ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65562025-03-07T23:30:15.069ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65572025-03-07T23:30:15.069ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65582025-03-07T23:30:15.069ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65592025-03-07T23:30:15.082ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ById(b3a45edc-9cb4-4b82-adf1-62d15bef5089) } result = Ok(()) saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_node = CallPantryAttachForDisk
65602025-03-07T23:30:15.097ZINFOtest_unauthorized (SagaExecutor): sending attach request for b3a45edc-9cb4-4b82-adf1-62d15bef5089 to [::1]:37181 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create
65612025-03-07T23:30:15.202ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
65622025-03-07T23:30:15.208ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
65632025-03-07T23:30:15.208ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
65642025-03-07T23:30:15.208ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
65652025-03-07T23:30:15.209ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
65662025-03-07T23:30:15.210ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: a5 12 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:62736 req_id = 16a5d1a3-bb37-483d-a588-7758b7120a43
65672025-03-07T23:30:15.210ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 42258,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62736 req_id = 16a5d1a3-bb37-483d-a588-7758b7120a43
65682025-03-07T23:30:15.210ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
65692025-03-07T23:30:15.210ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
65702025-03-07T23:30:15.211ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:62736 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal") })) }] req_id = 16a5d1a3-bb37-483d-a588-7758b7120a43
65712025-03-07T23:30:15.211ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3911, tv_nsec: 758492718 } })
65722025-03-07T23:30:15.211ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
65732025-03-07T23:30:15.212ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 69 de 01 00 00 01 00 00 00 00 00 01 24 39 37 30 i...........$970\n0010: 66 64 62 39 31 2d 63 35 30 65 2d 34 33 37 37 2d fdb91-c50e-4377-\n0020: 38 35 37 34 2d 33 36 66 61 65 37 62 33 65 34 65 8574-36fae7b3e4e\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:56712 req_id = 6efd6b84-bb2f-4425-a083-30816fca159b
65742025-03-07T23:30:15.212ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 27102,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 57,\n 55,\n 48,\n 102,\n 100,\n 98,\n 57,\n 49,\n 45,\n 99,\n 53,\n 48,\n 101,\n 45,\n 52,\n 51,\n 55,\n 55,\n 45,\n 56,\n 53,\n 55,\n 52,\n 45,\n 51,\n 54,\n 102,\n 97,\n 101,\n 55,\n 98,\n 51,\n 101,\n 52,\n 101,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56712 req_id = 6efd6b84-bb2f-4425-a083-30816fca159b
65752025-03-07T23:30:15.212ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
65762025-03-07T23:30:15.212ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:56712 query = LowerQuery { name: LowerName(Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.")), original: Query { name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 6efd6b84-bb2f-4425-a083-30816fca159b
65772025-03-07T23:30:15.214ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:46220 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
65782025-03-07T23:30:15.214ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
65792025-03-07T23:30:15.214ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
65802025-03-07T23:30:15.215ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = POST remote_addr = [::1]:46220 req_id = e57e68d0-c21f-45e8-9656-0a60e41d0bde sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/b3a45edc-9cb4-4b82-adf1-62d15bef5089
65812025-03-07T23:30:15.216ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1098 local_addr = [::1]:37181 method = POST remote_addr = [::1]:46220 req_id = e57e68d0-c21f-45e8-9656-0a60e41d0bde response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/b3a45edc-9cb4-4b82-adf1-62d15bef5089
65822025-03-07T23:30:15.221ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65832025-03-07T23:30:15.221ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
65842025-03-07T23:30:15.222ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
65852025-03-07T23:30:15.222ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
65862025-03-07T23:30:15.225ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65872025-03-07T23:30:15.225ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
65882025-03-07T23:30:15.257ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65892025-03-07T23:30:15.257ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
65902025-03-07T23:30:15.261ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65912025-03-07T23:30:15.261ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4
65922025-03-07T23:30:15.267ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
65932025-03-07T23:30:15.268ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = f8511010-5190-4845-9f3a-2f79f93bf6b4 saga_name = disk-create saga_result = SagaResult { saga_id: f8511010-5190-4845-9f3a-2f79f93bf6b4, saga_log: SagaLog { saga_id: f8511010-5190-4845-9f3a-2f79f93bf6b4, unwinding: false, events: [N011 started, N011 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N012 started, N012 succeeded], node_status: {0: Succeeded(String("b3a45edc-9cb4-4b82-adf1-62d15bef5089")), 1: Succeeded(String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")), 2: Succeeded(Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "name": String("demo-import-disk"), "time_created": String("2025-03-07T23:30:14.673199Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:14.673199Z")}, "pantry_address": Null, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:30:14.673198Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}), 3: Succeeded(Array [Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("28bacd20-7953-4b4b-bdab-0a111b494e82"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("747fdcb4-2d31-45ec-9ff5-f6b6f5675f89"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}], Array [Object {"identity": Object {"id": String("e623ce6a-105d-42bb-89b1-f0546be9ed27"), "time_created": String("2025-03-07T23:30:06.145318Z"), "time_modified": String("2025-03-07T23:30:06.145318Z")}, "ip": String("::1"), "pool_id": String("d150ed47-35a1-423a-b216-759535a68878"), "port": Number(45686), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e623ce6a-105d-42bb-89b1-f0546be9ed27"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("5b3ea644-3f93-49a2-b626-f3ebe852781b"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}]]), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Object {"block_size": Number(4096), "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "key": String("QKwMGwAoOOGFssRZilx5w8KQd1eVBPTEmqaPL14d25M="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1151"), String("[::1]:1001"), String("[::1]:1100")]}, "type": String("region")}], "type": String("volume")}), 7: Succeeded(Null), 8: Succeeded(Null), 9: Succeeded(String("[::1]:37181")), 10: Succeeded(Null), 11: Succeeded(Null), 12: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"call_pantry_attach_for_disk": Null, "created_disk": Object {"block_size": String("AdvancedFormat"), "create_image_id": Null, "create_snapshot_id": Null, "identity": Object {"description": String(""), "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "name": String("demo-import-disk"), "time_created": String("2025-03-07T23:30:14.673199Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:14.673199Z")}, "pantry_address": Null, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "rcgen": Number(1), "runtime_state": Object {"attach_instance_id": Null, "disk_state": String("creating"), "gen": Number(1), "time_updated": String("2025-03-07T23:30:14.673198Z")}, "size": Number(2147483648), "slot": Null, "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}, "created_volume": Null, "datasets_and_regions": Array [Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("28bacd20-7953-4b4b-bdab-0a111b494e82"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("747fdcb4-2d31-45ec-9ff5-f6b6f5675f89"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}], Array [Object {"identity": Object {"id": String("e623ce6a-105d-42bb-89b1-f0546be9ed27"), "time_created": String("2025-03-07T23:30:06.145318Z"), "time_modified": String("2025-03-07T23:30:06.145318Z")}, "ip": String("::1"), "pool_id": String("d150ed47-35a1-423a-b216-759535a68878"), "port": Number(45686), "rcgen": Number(1), "size_used": Number(2147483648), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("e623ce6a-105d-42bb-89b1-f0546be9ed27"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("5b3ea644-3f93-49a2-b626-f3ebe852781b"), "time_created": String("2025-03-07T23:30:14.788229Z"), "time_modified": String("2025-03-07T23:30:14.788229Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")}]], "disk_id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "disk_runtime": Null, "no_result": Null, "pantry_address": String("[::1]:37181"), "regions_ensure": Object {"block_size": Number(4096), "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("b3a45edc-9cb4-4b82-adf1-62d15bef5089"), "key": String("QKwMGwAoOOGFssRZilx5w8KQd1eVBPTEmqaPL14d25M="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1151"), String("[::1]:1001"), String("[::1]:1100")]}, "type": String("region")}], "type": String("volume")}, "regions_ensure_undo": Null, "volume_id": String("5a6276b9-822e-4faa-8b4a-137ae2c53b48")} }) }
65942025-03-07T23:30:15.268ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 700597 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0127471e-f4e2-4db1-b5d0-ad4b2ccb66fd response_code = 201 uri = /v1/disks?project=demo-project
65952025-03-07T23:30:15.268ZINFOtest_unauthorized (external client test context): client received response status = 201
65962025-03-07T23:30:15.269ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances?project=demo-project
65972025-03-07T23:30:15.269ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 uri = /v1/instances?project=demo-project
65982025-03-07T23:30:15.270ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 uri = /v1/instances?project=demo-project
65992025-03-07T23:30:15.270ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
66002025-03-07T23:30:15.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66012025-03-07T23:30:15.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66022025-03-07T23:30:15.271ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66032025-03-07T23:30:15.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66042025-03-07T23:30:15.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66052025-03-07T23:30:15.289ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66062025-03-07T23:30:15.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
66072025-03-07T23:30:15.292ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
66082025-03-07T23:30:15.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66092025-03-07T23:30:15.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66102025-03-07T23:30:15.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66112025-03-07T23:30:15.298ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
66122025-03-07T23:30:15.298ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66132025-03-07T23:30:15.298ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66142025-03-07T23:30:15.298ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66152025-03-07T23:30:15.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
66162025-03-07T23:30:15.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
66172025-03-07T23:30:15.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66182025-03-07T23:30:15.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66192025-03-07T23:30:15.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66202025-03-07T23:30:15.312ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
66212025-03-07T23:30:15.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
66222025-03-07T23:30:15.318ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
66232025-03-07T23:30:15.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66242025-03-07T23:30:15.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66252025-03-07T23:30:15.319ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66262025-03-07T23:30:15.338ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
66272025-03-07T23:30:15.338ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
66282025-03-07T23:30:15.338ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
66292025-03-07T23:30:15.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
66302025-03-07T23:30:15.343ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
66312025-03-07T23:30:15.349ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
66322025-03-07T23:30:15.349ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 uri = /v1/instances?project=demo-project
66332025-03-07T23:30:15.349ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66342025-03-07T23:30:15.349ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66352025-03-07T23:30:15.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66362025-03-07T23:30:15.354ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66372025-03-07T23:30:15.354ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66382025-03-07T23:30:15.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66392025-03-07T23:30:15.357ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
66402025-03-07T23:30:15.357ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
66412025-03-07T23:30:15.357ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66422025-03-07T23:30:15.357ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66432025-03-07T23:30:15.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66442025-03-07T23:30:15.361ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
66452025-03-07T23:30:15.361ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66462025-03-07T23:30:15.361ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66472025-03-07T23:30:15.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66482025-03-07T23:30:15.374ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
66492025-03-07T23:30:15.374ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66502025-03-07T23:30:15.374ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66512025-03-07T23:30:15.374ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66522025-03-07T23:30:15.381ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
66532025-03-07T23:30:15.394ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
66542025-03-07T23:30:15.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66552025-03-07T23:30:15.395ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66562025-03-07T23:30:15.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66572025-03-07T23:30:15.414ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
66582025-03-07T23:30:15.415ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
66592025-03-07T23:30:15.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66602025-03-07T23:30:15.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66612025-03-07T23:30:15.416ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66622025-03-07T23:30:15.416ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5f659d70-931d-4884-8db5-7631550dded7 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
66632025-03-07T23:30:15.417ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5f659d70-931d-4884-8db5-7631550dded7 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
66642025-03-07T23:30:15.417ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5f659d70-931d-4884-8db5-7631550dded7 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
66652025-03-07T23:30:15.417ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5f659d70-931d-4884-8db5-7631550dded7 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
66662025-03-07T23:30:15.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
66672025-03-07T23:30:15.420ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
66682025-03-07T23:30:15.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66692025-03-07T23:30:15.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66702025-03-07T23:30:15.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66712025-03-07T23:30:15.422ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5785 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 5f659d70-931d-4884-8db5-7631550dded7 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
66722025-03-07T23:30:15.423ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "5f659d70-931d-4884-8db5-7631550dded7", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:14 GMT"} })
66732025-03-07T23:30:15.423ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
66742025-03-07T23:30:15.423ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = be7c44b5-dab9-46e8-ba5c-07ff92e2c007 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
66752025-03-07T23:30:15.424ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = be7c44b5-dab9-46e8-ba5c-07ff92e2c007 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
66762025-03-07T23:30:15.424ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = be7c44b5-dab9-46e8-ba5c-07ff92e2c007 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
66772025-03-07T23:30:15.424ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = be7c44b5-dab9-46e8-ba5c-07ff92e2c007 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
66782025-03-07T23:30:15.426ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
66792025-03-07T23:30:15.426ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66802025-03-07T23:30:15.426ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66812025-03-07T23:30:15.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66822025-03-07T23:30:15.430ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7038 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = be7c44b5-dab9-46e8-ba5c-07ff92e2c007 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
66832025-03-07T23:30:15.431ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "be7c44b5-dab9-46e8-ba5c-07ff92e2c007", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:14 GMT"} })
66842025-03-07T23:30:15.431ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
66852025-03-07T23:30:15.432ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
66862025-03-07T23:30:15.432ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
66872025-03-07T23:30:15.433ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
66882025-03-07T23:30:15.438ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
66892025-03-07T23:30:15.438ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
66902025-03-07T23:30:15.439ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
66912025-03-07T23:30:15.439ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66922025-03-07T23:30:15.439ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66932025-03-07T23:30:15.440ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
66942025-03-07T23:30:15.444ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
66952025-03-07T23:30:15.445ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
66962025-03-07T23:30:15.446ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
66972025-03-07T23:30:15.446ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
66982025-03-07T23:30:15.446ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
66992025-03-07T23:30:15.448ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
67002025-03-07T23:30:15.452ZINFOtest_unauthorized (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:1025 local_addr = 127.0.0.1:52350 remote_addr = 127.0.0.1:51991
67012025-03-07T23:30:15.453ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = da20ffde-8153-4edb-a611-2ce3ec6315c4 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67022025-03-07T23:30:15.473ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 19518 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = da20ffde-8153-4edb-a611-2ce3ec6315c4 response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67032025-03-07T23:30:15.473ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
67042025-03-07T23:30:15.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
67052025-03-07T23:30:15.475ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
67062025-03-07T23:30:15.475ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
67072025-03-07T23:30:15.476ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
67082025-03-07T23:30:15.490ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67092025-03-07T23:30:15.529ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67102025-03-07T23:30:15.529ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67112025-03-07T23:30:15.529ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67122025-03-07T23:30:15.529ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
67132025-03-07T23:30:15.529ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
67142025-03-07T23:30:15.529ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
67152025-03-07T23:30:15.530ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
67162025-03-07T23:30:15.530ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
67172025-03-07T23:30:15.531ZDEBGtest_unauthorized (results-sink): inserting 40 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
67182025-03-07T23:30:15.531ZDEBGtest_unauthorized (results-sink-cluster): inserting 40 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
67192025-03-07T23:30:15.531ZDEBGtest_unauthorized (clickhouse-client): unrolling 40 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67202025-03-07T23:30:15.533ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67212025-03-07T23:30:15.533ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('integration_target:integration_metric') FORMAT Native;
67222025-03-07T23:30:15.551ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67232025-03-07T23:30:15.551ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:30:15.533694983Z } timeseries_name = http_service:request_latency_histogram
67242025-03-07T23:30:15.580ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67252025-03-07T23:30:15.580ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
67262025-03-07T23:30:15.580ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
67272025-03-07T23:30:15.584ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
67282025-03-07T23:30:15.584ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
67292025-03-07T23:30:15.584ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
67302025-03-07T23:30:15.585ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
67312025-03-07T23:30:15.592ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67322025-03-07T23:30:15.592ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:30:15.580220083Z } timeseries_name = collection_target:cpus_provisioned
67332025-03-07T23:30:15.595ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67342025-03-07T23:30:15.595ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
67352025-03-07T23:30:15.595ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67362025-03-07T23:30:15.595ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67372025-03-07T23:30:15.597ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67382025-03-07T23:30:15.598ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67392025-03-07T23:30:15.598ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67402025-03-07T23:30:15.598ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
67412025-03-07T23:30:15.601ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create
67422025-03-07T23:30:15.606ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"ef953048-152e-4f15-a379-1728c91991da","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"98ef0278-21e1-407a-8d2a-66d73112f6d9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"555b4853-4303-4682-8075-4c753db3fa6f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"622a316f-36d3-44f5-9a44-7b775dd0e97d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"3f2cce52-1482-4103-9adb-53ddbbeba919","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"f49967d6-6966-4b34-bd1d-48b05c52f817","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"f41223fc-5e0c-472d-bf65-fed8e6a60cb1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"5a9f3741-efbd-4939-8b2f-c27c22e36bc5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"8624281d-ca34-4885-94f5-e51926a480d4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"997ad4f9-b929-406d-87a5-a50052703c6f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"f1c41452-b4c5-46c3-9d09-433fba4e3c54","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"23ee215a-fa64-4c17-ab14-d173e5af8935","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"66821c4f-7652-4001-8e07-b27beefc23be","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"0dd47566-ff7f-43fc-84ba-44db0126133d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"02097e86-59e7-41af-9006-ef82885bcaed","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"b6290e10-6cbe-413d-a7dd-2b2494a87053","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"e64c5749-e92d-42f0-a928-50d0e3ab7a99","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"3fbc5f3a-bedb-435f-ada5-bbae08c5fb96","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"eca2f41d-30d5-4f6e-9289-1e9df4275702","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"32c459a0-064e-4fec-a1b8-eaef1c0142a7","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"da3c7d64-bee8-4f3a-a654-4ceeca9fea10","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"322571b2-ca44-4efa-9d9b-1f3efc870164","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"ea8c59da-8590-421a-a348-df2dd4675c82","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"0671db26-c3f0-45f5-a58b-b4f81f5f913c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"cf092ec2-23cf-4768-bdba-c2460436fa7b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"cf49999f-b597-422b-b854-9ad38b916849","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"fdd5ac8c-c18e-4f18-a3bf-03b3a9bf8394","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"2b73b388-9474-4461-8b1c-78273f0a50a4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"1253f8f3-1e04-4ef2-94c6-4f56f2ea0e5c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"f96c38f8-e121-45e8-b8c1-27ac28c22ae0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"56a81c85-d372-44ff-b771-cf1b392f3117","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"0182605f-015c-4868-86cb-c05c293d94b8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"33ffa7ff-bea4-45a4-b078-987ced2643fc","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"69d45db6-1b9b-4deb-bc83-484a69b2555a","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"c24ce23d-ccbf-4eb0-8fc6-d1f126a12e6b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"362b86e5-69d5-4190-b68a-51901a0f14c1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"7a13e915-7f88-4ace-aa9b-ef6095f1e2ac","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"9d69a00d-3b11-4770-84b5-f9d02808bc8f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","new_id":"3736812c-4390-4e3e-93b8-ebf4bcb0969d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167} saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67432025-03-07T23:30:15.608ZINFOtest_unauthorized (SecStore): creating saga saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create
67442025-03-07T23:30:15.610ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67452025-03-07T23:30:15.610ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:30:15.595579518Z } timeseries_name = collection_target:ram_provisioned
67462025-03-07T23:30:15.611ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67472025-03-07T23:30:15.611ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
67482025-03-07T23:30:15.614ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67492025-03-07T23:30:15.614ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:30:15.611321710Z } timeseries_name = collection_target:virtual_disk_space_provisioned
67502025-03-07T23:30:15.630ZDEBGtest_unauthorized (clickhouse-client): inserting 4 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
67512025-03-07T23:30:15.630ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 6 n_rows = 4 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
67522025-03-07T23:30:15.632ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create
67532025-03-07T23:30:15.632ZINFOtest_unauthorized (SEC): saga start saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67542025-03-07T23:30:15.632ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67552025-03-07T23:30:15.632ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 167 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
67562025-03-07T23:30:15.634ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
67572025-03-07T23:30:15.637ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 32 sql = INSERT INTO oximeter.fields_string FORMAT Native
67582025-03-07T23:30:15.638ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67592025-03-07T23:30:15.638ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 167 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
67602025-03-07T23:30:15.641ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 32 table_name = fields_string
67612025-03-07T23:30:15.643ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 16 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
67622025-03-07T23:30:15.644ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67632025-03-07T23:30:15.645ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
67642025-03-07T23:30:15.650ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67652025-03-07T23:30:15.650ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc")) node_id = 0 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
67662025-03-07T23:30:15.650ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 16 table_name = fields_u16
67672025-03-07T23:30:15.650ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 34 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
67682025-03-07T23:30:15.653ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
67692025-03-07T23:30:15.653ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
67702025-03-07T23:30:15.658ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 34 table_name = fields_uuid
67712025-03-07T23:30:15.658ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 16 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
67722025-03-07T23:30:15.673ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67732025-03-07T23:30:15.673ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67742025-03-07T23:30:15.674ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67752025-03-07T23:30:15.676ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 16 table_name = measurements_histogramu64
67762025-03-07T23:30:15.676ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 24 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
67772025-03-07T23:30:15.678ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67782025-03-07T23:30:15.678ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67792025-03-07T23:30:15.680ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67802025-03-07T23:30:15.686ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 24 table_name = measurements_i64
67812025-03-07T23:30:15.690ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
67822025-03-07T23:30:15.690ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67832025-03-07T23:30:15.690ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67842025-03-07T23:30:15.690ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67852025-03-07T23:30:15.690ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67862025-03-07T23:30:15.691ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67872025-03-07T23:30:15.711ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67882025-03-07T23:30:15.711ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67892025-03-07T23:30:15.712ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67902025-03-07T23:30:15.717ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67912025-03-07T23:30:15.725ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67922025-03-07T23:30:15.725ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67932025-03-07T23:30:15.725ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67942025-03-07T23:30:15.726ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67952025-03-07T23:30:15.731ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67962025-03-07T23:30:15.739ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67972025-03-07T23:30:15.739ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67982025-03-07T23:30:15.739ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
67992025-03-07T23:30:15.739ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68002025-03-07T23:30:15.739ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68012025-03-07T23:30:15.740ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68022025-03-07T23:30:15.753ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68032025-03-07T23:30:15.753ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68042025-03-07T23:30:15.753ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68052025-03-07T23:30:15.754ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68062025-03-07T23:30:15.842ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68072025-03-07T23:30:15.843ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68082025-03-07T23:30:15.843ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68092025-03-07T23:30:15.843ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68102025-03-07T23:30:15.855ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68112025-03-07T23:30:15.869ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68122025-03-07T23:30:15.869ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68132025-03-07T23:30:15.869ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68142025-03-07T23:30:15.870ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateInstanceRecord
68152025-03-07T23:30:15.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68162025-03-07T23:30:15.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:30:15.673460Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:15.673460Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:15.673460Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}) node_id = 1 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68172025-03-07T23:30:15.948ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68182025-03-07T23:30:15.948ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68192025-03-07T23:30:15.955ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68202025-03-07T23:30:15.955ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68212025-03-07T23:30:15.956ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68222025-03-07T23:30:15.958ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68232025-03-07T23:30:15.958ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68242025-03-07T23:30:15.962ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68252025-03-07T23:30:15.969ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68262025-03-07T23:30:15.969ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68272025-03-07T23:30:15.969ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68282025-03-07T23:30:15.969ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68292025-03-07T23:30:15.970ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68302025-03-07T23:30:15.974ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68312025-03-07T23:30:15.974ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68322025-03-07T23:30:15.974ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68332025-03-07T23:30:15.974ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68342025-03-07T23:30:15.982ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68352025-03-07T23:30:15.995ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68362025-03-07T23:30:15.995ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68372025-03-07T23:30:15.995ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68382025-03-07T23:30:15.995ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68392025-03-07T23:30:15.995ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68402025-03-07T23:30:15.996ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68412025-03-07T23:30:16.000ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68422025-03-07T23:30:16.000ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68432025-03-07T23:30:16.000ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68442025-03-07T23:30:16.001ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68452025-03-07T23:30:16.004ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68462025-03-07T23:30:16.006ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = AssociateSshKeys
68472025-03-07T23:30:16.006ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68482025-03-07T23:30:16.006ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68492025-03-07T23:30:16.030ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68502025-03-07T23:30:16.030ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68512025-03-07T23:30:16.043ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68522025-03-07T23:30:16.043ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 3 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68532025-03-07T23:30:16.046ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68542025-03-07T23:30:16.046ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68552025-03-07T23:30:16.049ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68562025-03-07T23:30:16.049ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68572025-03-07T23:30:16.062ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
68582025-03-07T23:30:16.062ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
68592025-03-07T23:30:16.091ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68602025-03-07T23:30:16.091ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68612025-03-07T23:30:16.092ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68622025-03-07T23:30:16.095ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68632025-03-07T23:30:16.095ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68642025-03-07T23:30:16.096ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68652025-03-07T23:30:16.097ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68662025-03-07T23:30:16.097ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68672025-03-07T23:30:16.098ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68682025-03-07T23:30:16.100ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68692025-03-07T23:30:16.100ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68702025-03-07T23:30:16.100ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68712025-03-07T23:30:16.100ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68722025-03-07T23:30:16.100ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68732025-03-07T23:30:16.103ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68742025-03-07T23:30:16.103ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68752025-03-07T23:30:16.103ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68762025-03-07T23:30:16.104ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68772025-03-07T23:30:16.107ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68782025-03-07T23:30:16.107ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68792025-03-07T23:30:16.107ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68802025-03-07T23:30:16.107ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68812025-03-07T23:30:16.110ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68822025-03-07T23:30:16.119ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68832025-03-07T23:30:16.120ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68842025-03-07T23:30:16.120ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68852025-03-07T23:30:16.120ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68862025-03-07T23:30:16.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
68872025-03-07T23:30:16.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
68882025-03-07T23:30:16.156ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68892025-03-07T23:30:16.156ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68902025-03-07T23:30:16.157ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68912025-03-07T23:30:16.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
68922025-03-07T23:30:16.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
68932025-03-07T23:30:16.162ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
68942025-03-07T23:30:16.163ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
68952025-03-07T23:30:16.165ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68962025-03-07T23:30:16.165ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68972025-03-07T23:30:16.166ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
68982025-03-07T23:30:16.167ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
68992025-03-07T23:30:16.167ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
69002025-03-07T23:30:16.169ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69012025-03-07T23:30:16.169ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69022025-03-07T23:30:16.169ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69032025-03-07T23:30:16.179ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69042025-03-07T23:30:16.179ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69052025-03-07T23:30:16.179ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69062025-03-07T23:30:16.179ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69072025-03-07T23:30:16.180ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69082025-03-07T23:30:16.183ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69092025-03-07T23:30:16.183ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69102025-03-07T23:30:16.183ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69112025-03-07T23:30:16.183ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69122025-03-07T23:30:16.202ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69132025-03-07T23:30:16.203ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69142025-03-07T23:30:16.203ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69152025-03-07T23:30:16.203ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69162025-03-07T23:30:16.225ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69172025-03-07T23:30:16.240ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69182025-03-07T23:30:16.240ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69192025-03-07T23:30:16.241ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69202025-03-07T23:30:16.242ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69212025-03-07T23:30:16.242ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69222025-03-07T23:30:16.243ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69232025-03-07T23:30:16.248ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69242025-03-07T23:30:16.248ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69252025-03-07T23:30:16.248ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69262025-03-07T23:30:16.248ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69272025-03-07T23:30:16.257ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69282025-03-07T23:30:16.257ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69292025-03-07T23:30:16.257ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69302025-03-07T23:30:16.258ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69312025-03-07T23:30:16.258ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
69322025-03-07T23:30:16.262ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69332025-03-07T23:30:16.270ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69342025-03-07T23:30:16.270ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69352025-03-07T23:30:16.270ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69362025-03-07T23:30:16.270ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69372025-03-07T23:30:16.270ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69382025-03-07T23:30:16.271ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69392025-03-07T23:30:16.299ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69402025-03-07T23:30:16.299ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69412025-03-07T23:30:16.299ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69422025-03-07T23:30:16.308ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69432025-03-07T23:30:16.329ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69442025-03-07T23:30:16.329ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69452025-03-07T23:30:16.329ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69462025-03-07T23:30:16.330ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69472025-03-07T23:30:16.337ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69482025-03-07T23:30:16.356ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69492025-03-07T23:30:16.357ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69502025-03-07T23:30:16.357ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69512025-03-07T23:30:16.357ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69522025-03-07T23:30:16.467ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69532025-03-07T23:30:16.468ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69542025-03-07T23:30:16.468ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateNetworkInterface0
69552025-03-07T23:30:16.478ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69562025-03-07T23:30:16.478ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69572025-03-07T23:30:16.489ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69582025-03-07T23:30:16.489ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69592025-03-07T23:30:16.512ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69602025-03-07T23:30:16.512ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69612025-03-07T23:30:16.524ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69622025-03-07T23:30:16.524ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69632025-03-07T23:30:16.557ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69642025-03-07T23:30:16.557ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("ef953048-152e-4f15-a379-1728c91991da"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 7 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69652025-03-07T23:30:16.565ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
69662025-03-07T23:30:16.566ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
69672025-03-07T23:30:16.567ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69682025-03-07T23:30:16.567ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69692025-03-07T23:30:16.582ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69702025-03-07T23:30:16.582ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69712025-03-07T23:30:16.590ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
69722025-03-07T23:30:16.593ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
69732025-03-07T23:30:16.593ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
69742025-03-07T23:30:16.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
69752025-03-07T23:30:16.598ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69762025-03-07T23:30:16.601ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69772025-03-07T23:30:16.670ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69782025-03-07T23:30:16.672ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69792025-03-07T23:30:16.676ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69802025-03-07T23:30:16.676ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69812025-03-07T23:30:16.703ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69822025-03-07T23:30:16.703ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69832025-03-07T23:30:16.723ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69842025-03-07T23:30:16.723ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69852025-03-07T23:30:16.737ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69862025-03-07T23:30:16.737ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("98ef0278-21e1-407a-8d2a-66d73112f6d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 11 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69872025-03-07T23:30:16.745ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69882025-03-07T23:30:16.745ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69892025-03-07T23:30:16.751ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69902025-03-07T23:30:16.751ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69912025-03-07T23:30:16.759ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69922025-03-07T23:30:16.759ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69932025-03-07T23:30:16.762ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69942025-03-07T23:30:16.762ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69952025-03-07T23:30:16.771ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69962025-03-07T23:30:16.771ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69972025-03-07T23:30:16.774ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
69982025-03-07T23:30:16.774ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
69992025-03-07T23:30:16.802ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70002025-03-07T23:30:16.802ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70012025-03-07T23:30:16.808ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70022025-03-07T23:30:16.808ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("555b4853-4303-4682-8075-4c753db3fa6f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 15 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70032025-03-07T23:30:16.819ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70042025-03-07T23:30:16.819ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70052025-03-07T23:30:16.846ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70062025-03-07T23:30:16.846ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70072025-03-07T23:30:16.857ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70082025-03-07T23:30:16.857ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70092025-03-07T23:30:16.913ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70102025-03-07T23:30:16.913ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70112025-03-07T23:30:16.924ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70122025-03-07T23:30:16.924ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70132025-03-07T23:30:16.936ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70142025-03-07T23:30:16.936ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70152025-03-07T23:30:16.946ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70162025-03-07T23:30:16.946ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70172025-03-07T23:30:16.966ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70182025-03-07T23:30:16.966ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("622a316f-36d3-44f5-9a44-7b775dd0e97d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 19 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70192025-03-07T23:30:16.971ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70202025-03-07T23:30:16.971ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70212025-03-07T23:30:16.975ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70222025-03-07T23:30:16.975ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70232025-03-07T23:30:16.977ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70242025-03-07T23:30:16.978ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70252025-03-07T23:30:16.980ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70262025-03-07T23:30:16.980ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70272025-03-07T23:30:16.984ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70282025-03-07T23:30:16.984ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 22 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70292025-03-07T23:30:16.987ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70302025-03-07T23:30:16.987ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70312025-03-07T23:30:16.992ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70322025-03-07T23:30:16.992ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 23 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70332025-03-07T23:30:16.994ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70342025-03-07T23:30:16.994ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3f2cce52-1482-4103-9adb-53ddbbeba919"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 23 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70352025-03-07T23:30:17.004ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70362025-03-07T23:30:17.004ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 24 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70372025-03-07T23:30:17.012ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70382025-03-07T23:30:17.012ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 24 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70392025-03-07T23:30:17.015ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70402025-03-07T23:30:17.015ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 25 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70412025-03-07T23:30:17.018ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70422025-03-07T23:30:17.018ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 25 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70432025-03-07T23:30:17.021ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70442025-03-07T23:30:17.021ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 26 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70452025-03-07T23:30:17.024ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70462025-03-07T23:30:17.024ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 26 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70472025-03-07T23:30:17.029ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70482025-03-07T23:30:17.029ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 27 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70492025-03-07T23:30:17.033ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70502025-03-07T23:30:17.033ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f49967d6-6966-4b34-bd1d-48b05c52f817"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 27 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70512025-03-07T23:30:17.036ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70522025-03-07T23:30:17.036ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 28 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70532025-03-07T23:30:17.041ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70542025-03-07T23:30:17.041ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 28 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70552025-03-07T23:30:17.044ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70562025-03-07T23:30:17.044ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 29 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70572025-03-07T23:30:17.047ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70582025-03-07T23:30:17.047ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 29 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70592025-03-07T23:30:17.049ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70602025-03-07T23:30:17.049ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 30 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70612025-03-07T23:30:17.064ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70622025-03-07T23:30:17.064ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 30 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70632025-03-07T23:30:17.072ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70642025-03-07T23:30:17.073ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 31 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70652025-03-07T23:30:17.076ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70662025-03-07T23:30:17.076ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f41223fc-5e0c-472d-bf65-fed8e6a60cb1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 31 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70672025-03-07T23:30:17.078ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70682025-03-07T23:30:17.079ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 32 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70692025-03-07T23:30:17.081ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70702025-03-07T23:30:17.081ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 32 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70712025-03-07T23:30:17.084ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70722025-03-07T23:30:17.084ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 33 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70732025-03-07T23:30:17.087ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70742025-03-07T23:30:17.087ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 33 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70752025-03-07T23:30:17.089ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70762025-03-07T23:30:17.089ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 34 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70772025-03-07T23:30:17.091ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70782025-03-07T23:30:17.091ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 34 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70792025-03-07T23:30:17.093ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70802025-03-07T23:30:17.094ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 35 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70812025-03-07T23:30:17.097ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70822025-03-07T23:30:17.098ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("0aa9b382-488a-4ab6-ba5f-3c2bb6a63f1d")) node_id = 35 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70832025-03-07T23:30:17.100ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
70842025-03-07T23:30:17.100ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 36 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
70852025-03-07T23:30:17.103ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateSnatIp
70862025-03-07T23:30:17.103ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateSnatIp
70872025-03-07T23:30:17.104ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateSnatIp
70882025-03-07T23:30:17.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
70892025-03-07T23:30:17.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
70902025-03-07T23:30:17.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
70912025-03-07T23:30:17.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
70922025-03-07T23:30:17.162ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
70932025-03-07T23:30:17.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
70942025-03-07T23:30:17.167ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
70952025-03-07T23:30:17.167ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
70962025-03-07T23:30:17.203ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateSnatIp
70972025-03-07T23:30:17.203ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateSnatIp
70982025-03-07T23:30:17.206ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateSnatIp
70992025-03-07T23:30:17.258ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
71002025-03-07T23:30:17.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
71012025-03-07T23:30:17.410ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
71022025-03-07T23:30:17.411ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0ada75d6-8c97-4605-b0c8-7212670d5422 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
71032025-03-07T23:30:17.411ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0ada75d6-8c97-4605-b0c8-7212670d5422 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
71042025-03-07T23:30:17.411ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0ada75d6-8c97-4605-b0c8-7212670d5422 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
71052025-03-07T23:30:17.412ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0ada75d6-8c97-4605-b0c8-7212670d5422 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
71062025-03-07T23:30:17.415ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3965 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0ada75d6-8c97-4605-b0c8-7212670d5422 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
71072025-03-07T23:30:17.415ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0ada75d6-8c97-4605-b0c8-7212670d5422", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:17 GMT"} })
71082025-03-07T23:30:17.415ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
71092025-03-07T23:30:17.415ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b4bb2f6-816e-4610-8094-e843ef6c46e9 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
71102025-03-07T23:30:17.416ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b4bb2f6-816e-4610-8094-e843ef6c46e9 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
71112025-03-07T23:30:17.416ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b4bb2f6-816e-4610-8094-e843ef6c46e9 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
71122025-03-07T23:30:17.416ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b4bb2f6-816e-4610-8094-e843ef6c46e9 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
71132025-03-07T23:30:17.418ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 2640 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b4bb2f6-816e-4610-8094-e843ef6c46e9 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
71142025-03-07T23:30:17.418ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b4bb2f6-816e-4610-8094-e843ef6c46e9", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:17 GMT"} })
71152025-03-07T23:30:17.418ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71162025-03-07T23:30:17.418ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71172025-03-07T23:30:17.418ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
71182025-03-07T23:30:17.423ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71192025-03-07T23:30:17.423ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 36 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71202025-03-07T23:30:17.425ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71212025-03-07T23:30:17.426ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 37 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71222025-03-07T23:30:17.428ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71232025-03-07T23:30:17.429ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 37 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71242025-03-07T23:30:17.431ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71252025-03-07T23:30:17.431ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 38 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71262025-03-07T23:30:17.434ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71272025-03-07T23:30:17.434ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 38 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71282025-03-07T23:30:17.436ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71292025-03-07T23:30:17.436ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 39 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71302025-03-07T23:30:17.439ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71312025-03-07T23:30:17.439ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71322025-03-07T23:30:17.440ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71332025-03-07T23:30:17.442ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71342025-03-07T23:30:17.442ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71352025-03-07T23:30:17.442ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71362025-03-07T23:30:17.442ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71372025-03-07T23:30:17.443ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71382025-03-07T23:30:17.446ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71392025-03-07T23:30:17.448ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71402025-03-07T23:30:17.448ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71412025-03-07T23:30:17.448ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71422025-03-07T23:30:17.449ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71432025-03-07T23:30:17.453ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71442025-03-07T23:30:17.453ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71452025-03-07T23:30:17.453ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71462025-03-07T23:30:17.453ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71472025-03-07T23:30:17.453ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71482025-03-07T23:30:17.457ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71492025-03-07T23:30:17.460ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71502025-03-07T23:30:17.460ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71512025-03-07T23:30:17.460ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71522025-03-07T23:30:17.461ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71532025-03-07T23:30:17.567ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71542025-03-07T23:30:17.567ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71552025-03-07T23:30:17.568ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71562025-03-07T23:30:17.570ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71572025-03-07T23:30:17.570ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71582025-03-07T23:30:17.570ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
71592025-03-07T23:30:17.616ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71602025-03-07T23:30:17.616ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71612025-03-07T23:30:17.617ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71622025-03-07T23:30:17.708ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71632025-03-07T23:30:17.708ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71642025-03-07T23:30:17.709ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71652025-03-07T23:30:17.710ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71662025-03-07T23:30:17.710ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71672025-03-07T23:30:17.711ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_node = CreateExternalIp0
71682025-03-07T23:30:17.723ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71692025-03-07T23:30:17.723ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:17.460532Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:17.616361Z")}) node_id = 39 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71702025-03-07T23:30:17.727ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71712025-03-07T23:30:17.727ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 40 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71722025-03-07T23:30:17.738ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71732025-03-07T23:30:17.738ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:17.460532Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:17.616361Z")}) node_id = 40 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71742025-03-07T23:30:17.760ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71752025-03-07T23:30:17.760ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 41 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71762025-03-07T23:30:17.767ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71772025-03-07T23:30:17.767ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("8624281d-ca34-4885-94f5-e51926a480d4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 41 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71782025-03-07T23:30:17.777ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71792025-03-07T23:30:17.777ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 42 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71802025-03-07T23:30:17.787ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71812025-03-07T23:30:17.787ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 42 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71822025-03-07T23:30:17.800ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71832025-03-07T23:30:17.800ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 43 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71842025-03-07T23:30:17.804ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71852025-03-07T23:30:17.804ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 43 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71862025-03-07T23:30:17.807ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71872025-03-07T23:30:17.807ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 44 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71882025-03-07T23:30:17.810ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71892025-03-07T23:30:17.811ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 44 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71902025-03-07T23:30:17.814ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71912025-03-07T23:30:17.814ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 45 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71922025-03-07T23:30:17.817ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71932025-03-07T23:30:17.817ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("997ad4f9-b929-406d-87a5-a50052703c6f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 45 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71942025-03-07T23:30:17.822ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71952025-03-07T23:30:17.822ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 46 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71962025-03-07T23:30:17.829ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71972025-03-07T23:30:17.830ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 46 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
71982025-03-07T23:30:17.833ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
71992025-03-07T23:30:17.833ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 47 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72002025-03-07T23:30:17.838ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72012025-03-07T23:30:17.838ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 47 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72022025-03-07T23:30:17.848ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72032025-03-07T23:30:17.848ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 48 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72042025-03-07T23:30:17.851ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72052025-03-07T23:30:17.851ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 48 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72062025-03-07T23:30:17.854ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72072025-03-07T23:30:17.854ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 49 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72082025-03-07T23:30:17.857ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72092025-03-07T23:30:17.857ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f1c41452-b4c5-46c3-9d09-433fba4e3c54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 49 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72102025-03-07T23:30:17.860ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72112025-03-07T23:30:17.860ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 50 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72122025-03-07T23:30:17.864ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72132025-03-07T23:30:17.864ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 50 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72142025-03-07T23:30:17.866ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72152025-03-07T23:30:17.866ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 51 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72162025-03-07T23:30:17.871ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72172025-03-07T23:30:17.871ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 51 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72182025-03-07T23:30:17.876ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72192025-03-07T23:30:17.876ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 52 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72202025-03-07T23:30:17.879ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72212025-03-07T23:30:17.879ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 52 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72222025-03-07T23:30:17.883ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72232025-03-07T23:30:17.883ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 53 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72242025-03-07T23:30:17.885ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72252025-03-07T23:30:17.885ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("23ee215a-fa64-4c17-ab14-d173e5af8935"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 53 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72262025-03-07T23:30:17.888ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72272025-03-07T23:30:17.888ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 54 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72282025-03-07T23:30:17.890ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72292025-03-07T23:30:17.890ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 54 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72302025-03-07T23:30:17.893ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72312025-03-07T23:30:17.893ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 55 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72322025-03-07T23:30:17.896ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72332025-03-07T23:30:17.896ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 55 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72342025-03-07T23:30:17.898ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72352025-03-07T23:30:17.899ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 56 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72362025-03-07T23:30:17.901ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72372025-03-07T23:30:17.901ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 56 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72382025-03-07T23:30:17.903ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72392025-03-07T23:30:17.903ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 57 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72402025-03-07T23:30:17.907ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72412025-03-07T23:30:17.907ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("66821c4f-7652-4001-8e07-b27beefc23be"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 57 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72422025-03-07T23:30:17.911ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72432025-03-07T23:30:17.911ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 58 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72442025-03-07T23:30:17.916ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72452025-03-07T23:30:17.916ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 58 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72462025-03-07T23:30:17.935ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72472025-03-07T23:30:17.935ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 59 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72482025-03-07T23:30:17.940ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72492025-03-07T23:30:17.940ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 59 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72502025-03-07T23:30:17.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72512025-03-07T23:30:17.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 60 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72522025-03-07T23:30:17.946ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72532025-03-07T23:30:17.946ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 60 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72542025-03-07T23:30:17.949ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72552025-03-07T23:30:17.949ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 61 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72562025-03-07T23:30:17.952ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72572025-03-07T23:30:17.952ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0dd47566-ff7f-43fc-84ba-44db0126133d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 61 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72582025-03-07T23:30:17.956ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72592025-03-07T23:30:17.956ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 62 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72602025-03-07T23:30:17.958ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72612025-03-07T23:30:17.958ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 62 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72622025-03-07T23:30:17.962ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72632025-03-07T23:30:17.962ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 63 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72642025-03-07T23:30:17.966ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72652025-03-07T23:30:17.966ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 63 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72662025-03-07T23:30:17.968ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72672025-03-07T23:30:17.968ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 64 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72682025-03-07T23:30:17.971ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72692025-03-07T23:30:17.971ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 64 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72702025-03-07T23:30:17.973ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72712025-03-07T23:30:17.973ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 65 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72722025-03-07T23:30:17.975ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72732025-03-07T23:30:17.975ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("02097e86-59e7-41af-9006-ef82885bcaed"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 65 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72742025-03-07T23:30:17.978ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72752025-03-07T23:30:17.978ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 66 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72762025-03-07T23:30:17.980ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72772025-03-07T23:30:17.980ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 66 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72782025-03-07T23:30:17.983ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72792025-03-07T23:30:17.983ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 67 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72802025-03-07T23:30:17.986ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72812025-03-07T23:30:17.986ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 67 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72822025-03-07T23:30:17.988ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72832025-03-07T23:30:17.988ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 68 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72842025-03-07T23:30:17.990ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72852025-03-07T23:30:17.990ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 68 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72862025-03-07T23:30:17.993ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72872025-03-07T23:30:17.993ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 69 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72882025-03-07T23:30:17.995ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72892025-03-07T23:30:17.995ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("b6290e10-6cbe-413d-a7dd-2b2494a87053"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}) node_id = 69 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72902025-03-07T23:30:17.998ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72912025-03-07T23:30:17.999ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 70 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72922025-03-07T23:30:18.001ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72932025-03-07T23:30:18.001ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 70 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72942025-03-07T23:30:18.004ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72952025-03-07T23:30:18.004ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 71 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72962025-03-07T23:30:18.007ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72972025-03-07T23:30:18.007ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 71 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
72982025-03-07T23:30:18.010ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
72992025-03-07T23:30:18.010ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 72 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73002025-03-07T23:30:18.012ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73012025-03-07T23:30:18.012ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 72 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73022025-03-07T23:30:18.015ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73032025-03-07T23:30:18.015ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 73 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73042025-03-07T23:30:18.017ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73052025-03-07T23:30:18.017ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("e64c5749-e92d-42f0-a928-50d0e3ab7a99"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}) node_id = 73 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73062025-03-07T23:30:18.020ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73072025-03-07T23:30:18.020ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 74 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73082025-03-07T23:30:18.022ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73092025-03-07T23:30:18.023ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 74 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73102025-03-07T23:30:18.025ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73112025-03-07T23:30:18.025ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 75 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73122025-03-07T23:30:18.028ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73132025-03-07T23:30:18.028ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 75 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73142025-03-07T23:30:18.030ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73152025-03-07T23:30:18.030ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 76 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73162025-03-07T23:30:18.032ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73172025-03-07T23:30:18.032ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 76 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73182025-03-07T23:30:18.035ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73192025-03-07T23:30:18.035ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 77 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73202025-03-07T23:30:18.037ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73212025-03-07T23:30:18.037ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3fbc5f3a-bedb-435f-ada5-bbae08c5fb96"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}) node_id = 77 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73222025-03-07T23:30:18.040ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73232025-03-07T23:30:18.040ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 78 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73242025-03-07T23:30:18.043ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73252025-03-07T23:30:18.043ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 78 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73262025-03-07T23:30:18.046ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73272025-03-07T23:30:18.046ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 79 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73282025-03-07T23:30:18.049ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73292025-03-07T23:30:18.049ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 79 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73302025-03-07T23:30:18.052ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73312025-03-07T23:30:18.052ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 80 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73322025-03-07T23:30:18.054ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73332025-03-07T23:30:18.054ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 80 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73342025-03-07T23:30:18.056ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73352025-03-07T23:30:18.056ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 81 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73362025-03-07T23:30:18.059ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73372025-03-07T23:30:18.059ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("eca2f41d-30d5-4f6e-9289-1e9df4275702"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}) node_id = 81 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73382025-03-07T23:30:18.062ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73392025-03-07T23:30:18.062ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 82 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73402025-03-07T23:30:18.065ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73412025-03-07T23:30:18.065ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 82 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73422025-03-07T23:30:18.067ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73432025-03-07T23:30:18.067ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 83 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73442025-03-07T23:30:18.072ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73452025-03-07T23:30:18.072ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 83 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73462025-03-07T23:30:18.075ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73472025-03-07T23:30:18.075ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 84 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73482025-03-07T23:30:18.083ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73492025-03-07T23:30:18.083ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 84 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73502025-03-07T23:30:18.086ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73512025-03-07T23:30:18.086ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 85 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73522025-03-07T23:30:18.089ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73532025-03-07T23:30:18.089ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("32c459a0-064e-4fec-a1b8-eaef1c0142a7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}) node_id = 85 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73542025-03-07T23:30:18.093ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73552025-03-07T23:30:18.093ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 86 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73562025-03-07T23:30:18.095ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73572025-03-07T23:30:18.095ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 86 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73582025-03-07T23:30:18.099ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73592025-03-07T23:30:18.099ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 87 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73602025-03-07T23:30:18.102ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73612025-03-07T23:30:18.102ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 87 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73622025-03-07T23:30:18.105ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73632025-03-07T23:30:18.105ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 88 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73642025-03-07T23:30:18.107ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73652025-03-07T23:30:18.107ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 88 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73662025-03-07T23:30:18.110ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73672025-03-07T23:30:18.110ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 89 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73682025-03-07T23:30:18.113ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73692025-03-07T23:30:18.113ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("da3c7d64-bee8-4f3a-a654-4ceeca9fea10"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}) node_id = 89 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73702025-03-07T23:30:18.116ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73712025-03-07T23:30:18.116ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 90 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73722025-03-07T23:30:18.119ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73732025-03-07T23:30:18.119ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 90 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73742025-03-07T23:30:18.127ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73752025-03-07T23:30:18.127ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 91 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73762025-03-07T23:30:18.131ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73772025-03-07T23:30:18.131ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 91 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73782025-03-07T23:30:18.134ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73792025-03-07T23:30:18.134ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 92 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73802025-03-07T23:30:18.136ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73812025-03-07T23:30:18.137ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 92 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73822025-03-07T23:30:18.139ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73832025-03-07T23:30:18.139ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 93 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73842025-03-07T23:30:18.142ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73852025-03-07T23:30:18.142ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("322571b2-ca44-4efa-9d9b-1f3efc870164"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}) node_id = 93 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73862025-03-07T23:30:18.145ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73872025-03-07T23:30:18.145ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 94 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73882025-03-07T23:30:18.148ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73892025-03-07T23:30:18.148ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 94 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73902025-03-07T23:30:18.151ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73912025-03-07T23:30:18.151ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 95 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73922025-03-07T23:30:18.154ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73932025-03-07T23:30:18.154ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 95 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
73942025-03-07T23:30:18.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
73952025-03-07T23:30:18.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
73962025-03-07T23:30:18.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
73972025-03-07T23:30:18.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
73982025-03-07T23:30:18.158ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
73992025-03-07T23:30:18.158ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 96 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74002025-03-07T23:30:18.161ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74012025-03-07T23:30:18.161ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 96 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74022025-03-07T23:30:18.161ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
74032025-03-07T23:30:18.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
74042025-03-07T23:30:18.164ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74052025-03-07T23:30:18.164ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 97 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74062025-03-07T23:30:18.164ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
74072025-03-07T23:30:18.164ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
74082025-03-07T23:30:18.166ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74092025-03-07T23:30:18.166ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("ea8c59da-8590-421a-a348-df2dd4675c82"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}) node_id = 97 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74102025-03-07T23:30:18.169ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74112025-03-07T23:30:18.170ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 98 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74122025-03-07T23:30:18.172ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74132025-03-07T23:30:18.172ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 98 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74142025-03-07T23:30:18.175ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74152025-03-07T23:30:18.175ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 99 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74162025-03-07T23:30:18.178ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74172025-03-07T23:30:18.178ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 99 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74182025-03-07T23:30:18.180ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74192025-03-07T23:30:18.180ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 100 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74202025-03-07T23:30:18.183ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74212025-03-07T23:30:18.183ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 100 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74222025-03-07T23:30:18.187ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74232025-03-07T23:30:18.187ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 101 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74242025-03-07T23:30:18.189ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74252025-03-07T23:30:18.189ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0671db26-c3f0-45f5-a58b-b4f81f5f913c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}) node_id = 101 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74262025-03-07T23:30:18.192ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74272025-03-07T23:30:18.192ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 102 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74282025-03-07T23:30:18.195ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74292025-03-07T23:30:18.195ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 102 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74302025-03-07T23:30:18.197ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74312025-03-07T23:30:18.198ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 103 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74322025-03-07T23:30:18.200ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74332025-03-07T23:30:18.201ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 103 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74342025-03-07T23:30:18.204ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74352025-03-07T23:30:18.204ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 104 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74362025-03-07T23:30:18.207ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74372025-03-07T23:30:18.207ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 104 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74382025-03-07T23:30:18.209ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74392025-03-07T23:30:18.210ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 105 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74402025-03-07T23:30:18.214ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74412025-03-07T23:30:18.214ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("cf092ec2-23cf-4768-bdba-c2460436fa7b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}) node_id = 105 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74422025-03-07T23:30:18.219ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74432025-03-07T23:30:18.219ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 106 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74442025-03-07T23:30:18.221ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74452025-03-07T23:30:18.222ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 106 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74462025-03-07T23:30:18.227ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74472025-03-07T23:30:18.227ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 107 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74482025-03-07T23:30:18.231ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74492025-03-07T23:30:18.231ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 107 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74502025-03-07T23:30:18.234ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74512025-03-07T23:30:18.234ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 108 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74522025-03-07T23:30:18.237ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74532025-03-07T23:30:18.237ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 108 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74542025-03-07T23:30:18.242ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74552025-03-07T23:30:18.243ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 109 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74562025-03-07T23:30:18.246ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74572025-03-07T23:30:18.246ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("cf49999f-b597-422b-b854-9ad38b916849"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}) node_id = 109 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74582025-03-07T23:30:18.255ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74592025-03-07T23:30:18.255ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 110 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74602025-03-07T23:30:18.259ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
74612025-03-07T23:30:18.259ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74622025-03-07T23:30:18.259ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 110 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74632025-03-07T23:30:18.263ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74642025-03-07T23:30:18.263ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 111 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74652025-03-07T23:30:18.266ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74662025-03-07T23:30:18.266ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 111 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74672025-03-07T23:30:18.269ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74682025-03-07T23:30:18.269ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 112 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74692025-03-07T23:30:18.272ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74702025-03-07T23:30:18.272ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 112 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74712025-03-07T23:30:18.276ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74722025-03-07T23:30:18.276ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 113 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74732025-03-07T23:30:18.279ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74742025-03-07T23:30:18.279ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("fdd5ac8c-c18e-4f18-a3bf-03b3a9bf8394"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}) node_id = 113 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74752025-03-07T23:30:18.282ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74762025-03-07T23:30:18.282ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 114 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74772025-03-07T23:30:18.285ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74782025-03-07T23:30:18.285ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 114 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74792025-03-07T23:30:18.288ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74802025-03-07T23:30:18.288ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 115 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74812025-03-07T23:30:18.291ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74822025-03-07T23:30:18.291ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 115 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74832025-03-07T23:30:18.294ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74842025-03-07T23:30:18.294ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 116 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74852025-03-07T23:30:18.297ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74862025-03-07T23:30:18.297ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 116 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74872025-03-07T23:30:18.299ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74882025-03-07T23:30:18.299ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 117 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74892025-03-07T23:30:18.302ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74902025-03-07T23:30:18.302ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("2b73b388-9474-4461-8b1c-78273f0a50a4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}) node_id = 117 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74912025-03-07T23:30:18.306ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74922025-03-07T23:30:18.306ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 118 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74932025-03-07T23:30:18.309ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74942025-03-07T23:30:18.309ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 118 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74952025-03-07T23:30:18.312ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74962025-03-07T23:30:18.312ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 119 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74972025-03-07T23:30:18.315ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
74982025-03-07T23:30:18.315ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 119 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
74992025-03-07T23:30:18.318ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75002025-03-07T23:30:18.318ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 120 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75012025-03-07T23:30:18.320ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75022025-03-07T23:30:18.320ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 120 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75032025-03-07T23:30:18.323ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75042025-03-07T23:30:18.323ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 121 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75052025-03-07T23:30:18.325ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75062025-03-07T23:30:18.325ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("1253f8f3-1e04-4ef2-94c6-4f56f2ea0e5c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}) node_id = 121 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75072025-03-07T23:30:18.328ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75082025-03-07T23:30:18.328ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 122 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75092025-03-07T23:30:18.331ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75102025-03-07T23:30:18.331ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 122 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75112025-03-07T23:30:18.334ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75122025-03-07T23:30:18.334ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 123 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75132025-03-07T23:30:18.337ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75142025-03-07T23:30:18.337ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 123 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75152025-03-07T23:30:18.339ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75162025-03-07T23:30:18.339ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 124 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75172025-03-07T23:30:18.342ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75182025-03-07T23:30:18.342ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 124 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75192025-03-07T23:30:18.345ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75202025-03-07T23:30:18.345ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 125 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75212025-03-07T23:30:18.347ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75222025-03-07T23:30:18.347ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f96c38f8-e121-45e8-b8c1-27ac28c22ae0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}) node_id = 125 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75232025-03-07T23:30:18.350ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75242025-03-07T23:30:18.350ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 126 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75252025-03-07T23:30:18.353ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75262025-03-07T23:30:18.353ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 126 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75272025-03-07T23:30:18.356ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75282025-03-07T23:30:18.356ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 127 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75292025-03-07T23:30:18.359ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75302025-03-07T23:30:18.359ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 127 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75312025-03-07T23:30:18.362ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75322025-03-07T23:30:18.362ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 128 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75332025-03-07T23:30:18.364ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75342025-03-07T23:30:18.364ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 128 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75352025-03-07T23:30:18.367ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75362025-03-07T23:30:18.367ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 129 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75372025-03-07T23:30:18.369ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75382025-03-07T23:30:18.369ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("56a81c85-d372-44ff-b771-cf1b392f3117"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}) node_id = 129 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75392025-03-07T23:30:18.373ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75402025-03-07T23:30:18.373ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 130 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75412025-03-07T23:30:18.378ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75422025-03-07T23:30:18.378ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 130 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75432025-03-07T23:30:18.384ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75442025-03-07T23:30:18.384ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 131 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75452025-03-07T23:30:18.388ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75462025-03-07T23:30:18.388ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 131 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75472025-03-07T23:30:18.394ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75482025-03-07T23:30:18.394ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 132 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75492025-03-07T23:30:18.407ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75502025-03-07T23:30:18.407ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 132 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75512025-03-07T23:30:18.412ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75522025-03-07T23:30:18.412ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 133 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75532025-03-07T23:30:18.416ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75542025-03-07T23:30:18.416ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0182605f-015c-4868-86cb-c05c293d94b8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}) node_id = 133 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75552025-03-07T23:30:18.421ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75562025-03-07T23:30:18.421ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 134 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75572025-03-07T23:30:18.429ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75582025-03-07T23:30:18.429ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 134 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75592025-03-07T23:30:18.444ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75602025-03-07T23:30:18.444ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 135 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75612025-03-07T23:30:18.456ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75622025-03-07T23:30:18.456ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 135 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75632025-03-07T23:30:18.461ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75642025-03-07T23:30:18.461ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 136 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75652025-03-07T23:30:18.463ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75662025-03-07T23:30:18.463ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 136 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75672025-03-07T23:30:18.470ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75682025-03-07T23:30:18.470ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 137 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75692025-03-07T23:30:18.473ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75702025-03-07T23:30:18.473ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("33ffa7ff-bea4-45a4-b078-987ced2643fc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}) node_id = 137 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75712025-03-07T23:30:18.477ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75722025-03-07T23:30:18.477ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 138 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75732025-03-07T23:30:18.481ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75742025-03-07T23:30:18.481ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 138 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75752025-03-07T23:30:18.484ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75762025-03-07T23:30:18.484ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 139 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75772025-03-07T23:30:18.490ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75782025-03-07T23:30:18.490ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 139 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75792025-03-07T23:30:18.494ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75802025-03-07T23:30:18.494ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 140 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75812025-03-07T23:30:18.497ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75822025-03-07T23:30:18.497ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 140 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75832025-03-07T23:30:18.500ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75842025-03-07T23:30:18.501ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 141 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75852025-03-07T23:30:18.506ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75862025-03-07T23:30:18.506ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("69d45db6-1b9b-4deb-bc83-484a69b2555a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}) node_id = 141 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75872025-03-07T23:30:18.510ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75882025-03-07T23:30:18.510ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 142 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75892025-03-07T23:30:18.521ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75902025-03-07T23:30:18.521ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 142 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75912025-03-07T23:30:18.529ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75922025-03-07T23:30:18.529ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 143 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75932025-03-07T23:30:18.536ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75942025-03-07T23:30:18.537ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 143 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75952025-03-07T23:30:18.553ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
75962025-03-07T23:30:18.553ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 144 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
75972025-03-07T23:30:18.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75982025-03-07T23:30:18.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
75992025-03-07T23:30:18.565ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76002025-03-07T23:30:18.565ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 144 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76012025-03-07T23:30:18.567ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
76022025-03-07T23:30:18.568ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
76032025-03-07T23:30:18.568ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
76042025-03-07T23:30:18.569ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
76052025-03-07T23:30:18.571ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76062025-03-07T23:30:18.571ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 145 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76072025-03-07T23:30:18.575ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76082025-03-07T23:30:18.575ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("c24ce23d-ccbf-4eb0-8fc6-d1f126a12e6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}) node_id = 145 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76092025-03-07T23:30:18.589ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76102025-03-07T23:30:18.589ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 146 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76112025-03-07T23:30:18.598ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76122025-03-07T23:30:18.598ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 146 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76132025-03-07T23:30:18.606ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76142025-03-07T23:30:18.606ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 147 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76152025-03-07T23:30:18.612ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76162025-03-07T23:30:18.612ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 147 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76172025-03-07T23:30:18.640ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76182025-03-07T23:30:18.641ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 148 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76192025-03-07T23:30:18.674ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76202025-03-07T23:30:18.674ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 148 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76212025-03-07T23:30:18.681ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76222025-03-07T23:30:18.681ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 149 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76232025-03-07T23:30:18.700ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76242025-03-07T23:30:18.700ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("362b86e5-69d5-4190-b68a-51901a0f14c1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}) node_id = 149 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76252025-03-07T23:30:18.707ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76262025-03-07T23:30:18.707ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 150 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76272025-03-07T23:30:18.729ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76282025-03-07T23:30:18.729ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 150 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76292025-03-07T23:30:18.733ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76302025-03-07T23:30:18.733ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 151 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76312025-03-07T23:30:18.739ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76322025-03-07T23:30:18.739ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 151 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76332025-03-07T23:30:18.752ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76342025-03-07T23:30:18.752ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 152 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76352025-03-07T23:30:18.757ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76362025-03-07T23:30:18.757ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 152 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76372025-03-07T23:30:18.764ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76382025-03-07T23:30:18.764ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 153 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76392025-03-07T23:30:18.770ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76402025-03-07T23:30:18.770ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("7a13e915-7f88-4ace-aa9b-ef6095f1e2ac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}) node_id = 153 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76412025-03-07T23:30:18.777ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76422025-03-07T23:30:18.778ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 154 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76432025-03-07T23:30:18.791ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76442025-03-07T23:30:18.791ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 154 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76452025-03-07T23:30:18.796ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76462025-03-07T23:30:18.796ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 155 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76472025-03-07T23:30:18.801ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76482025-03-07T23:30:18.801ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 155 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76492025-03-07T23:30:18.819ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76502025-03-07T23:30:18.819ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 156 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76512025-03-07T23:30:18.833ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76522025-03-07T23:30:18.833ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 156 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76532025-03-07T23:30:18.836ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76542025-03-07T23:30:18.836ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 157 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76552025-03-07T23:30:18.857ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76562025-03-07T23:30:18.857ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("9d69a00d-3b11-4770-84b5-f9d02808bc8f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}) node_id = 157 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76572025-03-07T23:30:18.896ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76582025-03-07T23:30:18.896ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 158 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76592025-03-07T23:30:18.899ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76602025-03-07T23:30:18.899ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 158 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76612025-03-07T23:30:18.906ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76622025-03-07T23:30:18.907ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 159 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76632025-03-07T23:30:18.920ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76642025-03-07T23:30:18.920ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 159 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76652025-03-07T23:30:18.927ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76662025-03-07T23:30:18.927ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 160 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76672025-03-07T23:30:18.930ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76682025-03-07T23:30:18.930ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 160 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76692025-03-07T23:30:18.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76702025-03-07T23:30:18.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 161 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76712025-03-07T23:30:18.978ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76722025-03-07T23:30:18.978ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3736812c-4390-4e3e-93b8-ebf4bcb0969d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}) node_id = 161 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76732025-03-07T23:30:18.981ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76742025-03-07T23:30:18.981ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 162 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76752025-03-07T23:30:18.984ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76762025-03-07T23:30:18.984ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 162 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76772025-03-07T23:30:18.987ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76782025-03-07T23:30:18.987ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 163 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76792025-03-07T23:30:18.999ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76802025-03-07T23:30:18.999ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 163 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76812025-03-07T23:30:19.010ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76822025-03-07T23:30:19.011ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 164 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76832025-03-07T23:30:19.014ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76842025-03-07T23:30:19.014ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 164 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76852025-03-07T23:30:19.018ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76862025-03-07T23:30:19.018ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 165 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76872025-03-07T23:30:19.024ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76882025-03-07T23:30:19.024ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 165 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76892025-03-07T23:30:19.027ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76902025-03-07T23:30:19.027ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 166 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76912025-03-07T23:30:19.037ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76922025-03-07T23:30:19.037ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 166 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76932025-03-07T23:30:19.041ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76942025-03-07T23:30:19.041ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 168 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76952025-03-07T23:30:19.043ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76962025-03-07T23:30:19.043ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 168 saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76972025-03-07T23:30:19.046ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = 81039356-5333-49d0-b60e-09360bb76b4c sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
76982025-03-07T23:30:19.046ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = 81039356-5333-49d0-b60e-09360bb76b4c
76992025-03-07T23:30:19.057ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77002025-03-07T23:30:19.059ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = 81039356-5333-49d0-b60e-09360bb76b4c saga_name = instance-create saga_result = SagaResult { saga_id: 81039356-5333-49d0-b60e-09360bb76b4c, saga_log: SagaLog { saga_id: 81039356-5333-49d0-b60e-09360bb76b4c, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:30:15.673460Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:15.673460Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:15.673460Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("ef953048-152e-4f15-a379-1728c91991da"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("98ef0278-21e1-407a-8d2a-66d73112f6d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("555b4853-4303-4682-8075-4c753db3fa6f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("622a316f-36d3-44f5-9a44-7b775dd0e97d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3f2cce52-1482-4103-9adb-53ddbbeba919"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f49967d6-6966-4b34-bd1d-48b05c52f817"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f41223fc-5e0c-472d-bf65-fed8e6a60cb1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("0aa9b382-488a-4ab6-ba5f-3c2bb6a63f1d")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:17.460532Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:17.616361Z")}), 40: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:17.460532Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:17.616361Z")}), 41: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("8624281d-ca34-4885-94f5-e51926a480d4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("997ad4f9-b929-406d-87a5-a50052703c6f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f1c41452-b4c5-46c3-9d09-433fba4e3c54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("23ee215a-fa64-4c17-ab14-d173e5af8935"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("66821c4f-7652-4001-8e07-b27beefc23be"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0dd47566-ff7f-43fc-84ba-44db0126133d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("02097e86-59e7-41af-9006-ef82885bcaed"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("b6290e10-6cbe-413d-a7dd-2b2494a87053"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("e64c5749-e92d-42f0-a928-50d0e3ab7a99"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3fbc5f3a-bedb-435f-ada5-bbae08c5fb96"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("eca2f41d-30d5-4f6e-9289-1e9df4275702"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("32c459a0-064e-4fec-a1b8-eaef1c0142a7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("da3c7d64-bee8-4f3a-a654-4ceeca9fea10"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("322571b2-ca44-4efa-9d9b-1f3efc870164"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("ea8c59da-8590-421a-a348-df2dd4675c82"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0671db26-c3f0-45f5-a58b-b4f81f5f913c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("cf092ec2-23cf-4768-bdba-c2460436fa7b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("cf49999f-b597-422b-b854-9ad38b916849"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("fdd5ac8c-c18e-4f18-a3bf-03b3a9bf8394"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("2b73b388-9474-4461-8b1c-78273f0a50a4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("1253f8f3-1e04-4ef2-94c6-4f56f2ea0e5c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f96c38f8-e121-45e8-b8c1-27ac28c22ae0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("56a81c85-d372-44ff-b771-cf1b392f3117"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0182605f-015c-4868-86cb-c05c293d94b8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("33ffa7ff-bea4-45a4-b078-987ced2643fc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("69d45db6-1b9b-4deb-bc83-484a69b2555a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("c24ce23d-ccbf-4eb0-8fc6-d1f126a12e6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("362b86e5-69d5-4190-b68a-51901a0f14c1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("7a13e915-7f88-4ace-aa9b-ef6095f1e2ac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("9d69a00d-3b11-4770-84b5-f9d02808bc8f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3736812c-4390-4e3e-93b8-ebf4bcb0969d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Object {"description": Null, "first_port": Number(0), "id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:17.460532Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:17.616361Z")}, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Object {"description": Null, "first_port": Number(0), "id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "ip": String("10.0.0.1/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:17.460532Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:17.616361Z")}, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("5a9f3741-efbd-4939-8b2f-c27c22e36bc5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("8624281d-ca34-4885-94f5-e51926a480d4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3fbc5f3a-bedb-435f-ada5-bbae08c5fb96"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("eca2f41d-30d5-4f6e-9289-1e9df4275702"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("32c459a0-064e-4fec-a1b8-eaef1c0142a7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("da3c7d64-bee8-4f3a-a654-4ceeca9fea10"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("322571b2-ca44-4efa-9d9b-1f3efc870164"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("ea8c59da-8590-421a-a348-df2dd4675c82"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0671db26-c3f0-45f5-a58b-b4f81f5f913c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("cf092ec2-23cf-4768-bdba-c2460436fa7b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("cf49999f-b597-422b-b854-9ad38b916849"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("fdd5ac8c-c18e-4f18-a3bf-03b3a9bf8394"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("997ad4f9-b929-406d-87a5-a50052703c6f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("2b73b388-9474-4461-8b1c-78273f0a50a4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("1253f8f3-1e04-4ef2-94c6-4f56f2ea0e5c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f96c38f8-e121-45e8-b8c1-27ac28c22ae0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("56a81c85-d372-44ff-b771-cf1b392f3117"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0182605f-015c-4868-86cb-c05c293d94b8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("33ffa7ff-bea4-45a4-b078-987ced2643fc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("69d45db6-1b9b-4deb-bc83-484a69b2555a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("c24ce23d-ccbf-4eb0-8fc6-d1f126a12e6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("362b86e5-69d5-4190-b68a-51901a0f14c1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("7a13e915-7f88-4ace-aa9b-ef6095f1e2ac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f1c41452-b4c5-46c3-9d09-433fba4e3c54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("9d69a00d-3b11-4770-84b5-f9d02808bc8f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3736812c-4390-4e3e-93b8-ebf4bcb0969d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("23ee215a-fa64-4c17-ab14-d173e5af8935"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("66821c4f-7652-4001-8e07-b27beefc23be"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0dd47566-ff7f-43fc-84ba-44db0126133d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("02097e86-59e7-41af-9006-ef82885bcaed"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("b6290e10-6cbe-413d-a7dd-2b2494a87053"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("e64c5749-e92d-42f0-a928-50d0e3ab7a99"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:30:15.673460Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:15.673460Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:15.673460Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("ef953048-152e-4f15-a379-1728c91991da"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("98ef0278-21e1-407a-8d2a-66d73112f6d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("555b4853-4303-4682-8075-4c753db3fa6f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("622a316f-36d3-44f5-9a44-7b775dd0e97d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("3f2cce52-1482-4103-9adb-53ddbbeba919"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f49967d6-6966-4b34-bd1d-48b05c52f817"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "new_id": String("f41223fc-5e0c-472d-bf65-fed8e6a60cb1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("0aa9b382-488a-4ab6-ba5f-3c2bb6a63f1d"), "stopped_instance": Null} }) }
77012025-03-07T23:30:19.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77022025-03-07T23:30:19.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77032025-03-07T23:30:19.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77042025-03-07T23:30:19.064ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77052025-03-07T23:30:19.064ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77062025-03-07T23:30:19.065ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77072025-03-07T23:30:19.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77082025-03-07T23:30:19.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77092025-03-07T23:30:19.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77102025-03-07T23:30:19.068ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } uri = /v1/instances?project=demo-project
77112025-03-07T23:30:19.068ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
77122025-03-07T23:30:19.068ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77132025-03-07T23:30:19.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77142025-03-07T23:30:19.069ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77152025-03-07T23:30:19.071ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
77162025-03-07T23:30:19.072ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77172025-03-07T23:30:19.072ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77182025-03-07T23:30:19.072ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77192025-03-07T23:30:19.075ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
77202025-03-07T23:30:19.075ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77212025-03-07T23:30:19.075ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77222025-03-07T23:30:19.075ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77232025-03-07T23:30:19.078ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
77242025-03-07T23:30:19.088ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) uri = /v1/instances?project=demo-project
77252025-03-07T23:30:19.088ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } uri = /v1/instances?project=demo-project
77262025-03-07T23:30:19.088ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
77272025-03-07T23:30:19.088ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77282025-03-07T23:30:19.089ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77292025-03-07T23:30:19.089ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77302025-03-07T23:30:19.092ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
77312025-03-07T23:30:19.092ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77322025-03-07T23:30:19.092ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77332025-03-07T23:30:19.092ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77342025-03-07T23:30:19.104ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
77352025-03-07T23:30:19.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77362025-03-07T23:30:19.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77372025-03-07T23:30:19.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77382025-03-07T23:30:19.115ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
77392025-03-07T23:30:19.129ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) uri = /v1/instances?project=demo-project
77402025-03-07T23:30:19.129ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
77412025-03-07T23:30:19.129ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
77422025-03-07T23:30:19.138ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
77432025-03-07T23:30:19.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
77442025-03-07T23:30:19.167ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
77452025-03-07T23:30:19.168ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
77462025-03-07T23:30:19.170ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
77472025-03-07T23:30:19.171ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start
77482025-03-07T23:30:19.172ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"demo-instance","identity":{"description":"","id":"2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc","name":"demo-instance","time_created":"2025-03-07T23:30:15.673460Z","time_deleted":null,"time_modified":"2025-03-07T23:30:15.673460Z"},"memory":17179869184,"ncpus":1,"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2025-03-07T23:30:15.673460Z"},"updater_gen":1,"updater_id":null,"user_data":[]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10} saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77492025-03-07T23:30:19.172ZINFOtest_unauthorized (SecStore): creating saga saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start
77502025-03-07T23:30:19.179ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start
77512025-03-07T23:30:19.180ZINFOtest_unauthorized (SEC): saga start saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77522025-03-07T23:30:19.180ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77532025-03-07T23:30:19.180ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77542025-03-07T23:30:19.180ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
77552025-03-07T23:30:19.180ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
77562025-03-07T23:30:19.184ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77572025-03-07T23:30:19.185ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77582025-03-07T23:30:19.186ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
77592025-03-07T23:30:19.186ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
77602025-03-07T23:30:19.188ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77612025-03-07T23:30:19.188ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77622025-03-07T23:30:19.191ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77632025-03-07T23:30:19.191ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("d729e66e-f784-45dc-a942-a102e8bb8331")) node_id = 0 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77642025-03-07T23:30:19.193ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77652025-03-07T23:30:19.193ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77662025-03-07T23:30:19.207ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
77672025-03-07T23:30:19.207ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
77682025-03-07T23:30:19.208ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
77692025-03-07T23:30:19.293ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
77702025-03-07T23:30:19.293ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77712025-03-07T23:30:19.293ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")) node_id = 1 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77722025-03-07T23:30:19.297ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77732025-03-07T23:30:19.297ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77742025-03-07T23:30:19.305ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = AllocPropolisIp
77752025-03-07T23:30:19.305ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = AllocPropolisIp
77762025-03-07T23:30:19.306ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = AllocPropolisIp
77772025-03-07T23:30:19.311ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77782025-03-07T23:30:19.311ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("::1:0")) node_id = 2 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77792025-03-07T23:30:19.314ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77802025-03-07T23:30:19.314ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77812025-03-07T23:30:19.319ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = CreateVmmRecord
77822025-03-07T23:30:19.319ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = CreateVmmRecord
77832025-03-07T23:30:19.320ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = CreateVmmRecord
77842025-03-07T23:30:19.381ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77852025-03-07T23:30:19.381ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-07T23:30:19.319697Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:30:19.319697Z"), "time_deleted": Null}) node_id = 3 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77862025-03-07T23:30:19.385ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
77872025-03-07T23:30:19.385ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
77882025-03-07T23:30:19.387ZINFOtest_unauthorized (SagaExecutor): moving instance to Starting state via saga instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start start_reason = AutoStart
77892025-03-07T23:30:19.387ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77902025-03-07T23:30:19.387ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77912025-03-07T23:30:19.388ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77922025-03-07T23:30:19.392ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77932025-03-07T23:30:19.392ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77942025-03-07T23:30:19.396ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77952025-03-07T23:30:19.397ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77962025-03-07T23:30:19.397ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77972025-03-07T23:30:19.399ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77982025-03-07T23:30:19.401ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
77992025-03-07T23:30:19.401ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78002025-03-07T23:30:19.401ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78012025-03-07T23:30:19.401ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78022025-03-07T23:30:19.401ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78032025-03-07T23:30:19.404ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78042025-03-07T23:30:19.404ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78052025-03-07T23:30:19.404ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78062025-03-07T23:30:19.405ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78072025-03-07T23:30:19.407ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78082025-03-07T23:30:19.407ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78092025-03-07T23:30:19.407ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78102025-03-07T23:30:19.408ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78112025-03-07T23:30:19.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
78122025-03-07T23:30:19.411ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78132025-03-07T23:30:19.420ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78142025-03-07T23:30:19.420ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78152025-03-07T23:30:19.420ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78162025-03-07T23:30:19.420ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78172025-03-07T23:30:19.420ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78182025-03-07T23:30:19.421ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78192025-03-07T23:30:19.422ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
78202025-03-07T23:30:19.429ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 4c0da1af-20d7-40c3-9bf8-450b529133dd uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
78212025-03-07T23:30:19.429ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 4c0da1af-20d7-40c3-9bf8-450b529133dd resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
78222025-03-07T23:30:19.429ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 4c0da1af-20d7-40c3-9bf8-450b529133dd roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
78232025-03-07T23:30:19.430ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 4c0da1af-20d7-40c3-9bf8-450b529133dd resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
78242025-03-07T23:30:19.431ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78252025-03-07T23:30:19.431ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78262025-03-07T23:30:19.431ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78272025-03-07T23:30:19.432ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78282025-03-07T23:30:19.437ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7994 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 4c0da1af-20d7-40c3-9bf8-450b529133dd response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
78292025-03-07T23:30:19.438ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78302025-03-07T23:30:19.438ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78312025-03-07T23:30:19.438ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78322025-03-07T23:30:19.439ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78332025-03-07T23:30:19.442ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "4c0da1af-20d7-40c3-9bf8-450b529133dd", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:18 GMT"} })
78342025-03-07T23:30:19.442ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
78352025-03-07T23:30:19.442ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 738cbb47-c517-43cf-8195-fabddc9c35bc uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
78362025-03-07T23:30:19.443ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 738cbb47-c517-43cf-8195-fabddc9c35bc resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
78372025-03-07T23:30:19.443ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 738cbb47-c517-43cf-8195-fabddc9c35bc roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
78382025-03-07T23:30:19.443ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 738cbb47-c517-43cf-8195-fabddc9c35bc resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
78392025-03-07T23:30:19.449ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6574 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 738cbb47-c517-43cf-8195-fabddc9c35bc response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
78402025-03-07T23:30:19.449ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78412025-03-07T23:30:19.460ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78422025-03-07T23:30:19.461ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78432025-03-07T23:30:19.461ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78442025-03-07T23:30:19.461ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = MarkAsStarting
78452025-03-07T23:30:19.463ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "738cbb47-c517-43cf-8195-fabddc9c35bc", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:18 GMT"} })
78462025-03-07T23:30:19.463ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
78472025-03-07T23:30:19.463ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78482025-03-07T23:30:19.463ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
78492025-03-07T23:30:19.492ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
78502025-03-07T23:30:19.492ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:30:15.673460Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:15.673460Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:15.673460Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}) node_id = 4 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
78512025-03-07T23:30:19.524ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
78522025-03-07T23:30:19.524ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
78532025-03-07T23:30:19.530ZINFOtest_unauthorized (SagaExecutor): start saga: ensuring instance dpd configuration instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start start_reason = AutoStart
78542025-03-07T23:30:19.530ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
78552025-03-07T23:30:19.530ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
78562025-03-07T23:30:19.531ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
78572025-03-07T23:30:19.543ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
78582025-03-07T23:30:19.543ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
78592025-03-07T23:30:19.543ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
78602025-03-07T23:30:19.543ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
78612025-03-07T23:30:19.544ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
78622025-03-07T23:30:19.547ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
78632025-03-07T23:30:19.552ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
78642025-03-07T23:30:19.552ZINFOtest_unauthorized (nexus): looking up instance's primary network interface instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc
78652025-03-07T23:30:19.552ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78662025-03-07T23:30:19.552ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78672025-03-07T23:30:19.552ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78682025-03-07T23:30:19.593ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78692025-03-07T23:30:19.593ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78702025-03-07T23:30:19.594ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78712025-03-07T23:30:19.594ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78722025-03-07T23:30:19.595ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78732025-03-07T23:30:19.602ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78742025-03-07T23:30:19.602ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78752025-03-07T23:30:19.603ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78762025-03-07T23:30:19.603ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78772025-03-07T23:30:19.604ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78782025-03-07T23:30:19.604ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78792025-03-07T23:30:19.604ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
78802025-03-07T23:30:19.606ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78812025-03-07T23:30:19.606ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78822025-03-07T23:30:19.606ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78832025-03-07T23:30:19.606ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78842025-03-07T23:30:19.606ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78852025-03-07T23:30:19.617ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78862025-03-07T23:30:19.617ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78872025-03-07T23:30:19.618ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78882025-03-07T23:30:19.618ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78892025-03-07T23:30:19.624ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78902025-03-07T23:30:19.624ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78912025-03-07T23:30:19.624ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78922025-03-07T23:30:19.625ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78932025-03-07T23:30:19.650ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78942025-03-07T23:30:19.677ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78952025-03-07T23:30:19.677ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78962025-03-07T23:30:19.677ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78972025-03-07T23:30:19.678ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78982025-03-07T23:30:19.678ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
78992025-03-07T23:30:19.679ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79002025-03-07T23:30:19.684ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79012025-03-07T23:30:19.684ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79022025-03-07T23:30:19.685ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79032025-03-07T23:30:19.692ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79042025-03-07T23:30:19.761ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79052025-03-07T23:30:19.761ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79062025-03-07T23:30:19.761ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79072025-03-07T23:30:19.762ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79082025-03-07T23:30:19.775ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79092025-03-07T23:30:19.787ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79102025-03-07T23:30:19.788ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79112025-03-07T23:30:19.788ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79122025-03-07T23:30:19.788ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79132025-03-07T23:30:19.802ZINFOtest_unauthorized (nexus): looking up instance's external IPs instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc
79142025-03-07T23:30:19.802ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79152025-03-07T23:30:19.802ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79162025-03-07T23:30:19.804ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79172025-03-07T23:30:19.873ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79182025-03-07T23:30:19.875ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79192025-03-07T23:30:19.878ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79202025-03-07T23:30:19.899ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79212025-03-07T23:30:19.899ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79222025-03-07T23:30:19.900ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = DpdEnsure
79232025-03-07T23:30:19.913ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
79242025-03-07T23:30:19.913ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
79252025-03-07T23:30:19.913ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
79262025-03-07T23:30:19.913ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
79272025-03-07T23:30:19.932ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
79282025-03-07T23:30:19.936ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
79292025-03-07T23:30:19.945ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
79302025-03-07T23:30:19.945ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
79312025-03-07T23:30:19.945ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
79322025-03-07T23:30:19.947ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
79332025-03-07T23:30:19.955ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
79342025-03-07T23:30:19.955ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
79352025-03-07T23:30:19.970ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
79362025-03-07T23:30:19.970ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
79372025-03-07T23:30:19.980ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 2 reason = Signaled
79382025-03-07T23:30:19.980ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79392025-03-07T23:30:19.980ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79402025-03-07T23:30:19.981ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79412025-03-07T23:30:19.981ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
79422025-03-07T23:30:19.981ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
79432025-03-07T23:30:19.985ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
79442025-03-07T23:30:19.985ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
79452025-03-07T23:30:19.993ZINFOtest_unauthorized (SagaExecutor): start saga: ensuring instance is registered on sled instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_reason = AutoStart
79462025-03-07T23:30:19.993ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79472025-03-07T23:30:19.993ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79482025-03-07T23:30:19.994ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79492025-03-07T23:30:19.997ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79502025-03-07T23:30:19.997ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79512025-03-07T23:30:19.998ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79522025-03-07T23:30:20.005ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79532025-03-07T23:30:20.005ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79542025-03-07T23:30:20.005ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79552025-03-07T23:30:20.006ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79562025-03-07T23:30:20.006ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79572025-03-07T23:30:20.006ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79582025-03-07T23:30:20.008ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79592025-03-07T23:30:20.008ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79602025-03-07T23:30:20.008ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79612025-03-07T23:30:20.008ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79622025-03-07T23:30:20.009ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79632025-03-07T23:30:20.013ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79642025-03-07T23:30:20.013ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79652025-03-07T23:30:20.013ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79662025-03-07T23:30:20.013ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79672025-03-07T23:30:20.016ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79682025-03-07T23:30:20.016ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79692025-03-07T23:30:20.016ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79702025-03-07T23:30:20.017ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79712025-03-07T23:30:20.020ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79722025-03-07T23:30:20.029ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79732025-03-07T23:30:20.029ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79742025-03-07T23:30:20.029ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79752025-03-07T23:30:20.030ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79762025-03-07T23:30:20.030ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79772025-03-07T23:30:20.030ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79782025-03-07T23:30:20.033ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79792025-03-07T23:30:20.033ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79802025-03-07T23:30:20.033ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79812025-03-07T23:30:20.049ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79822025-03-07T23:30:20.070ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79832025-03-07T23:30:20.070ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79842025-03-07T23:30:20.070ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79852025-03-07T23:30:20.071ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79862025-03-07T23:30:20.074ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79872025-03-07T23:30:20.099ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79882025-03-07T23:30:20.099ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79892025-03-07T23:30:20.099ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79902025-03-07T23:30:20.099ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79912025-03-07T23:30:20.099ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79922025-03-07T23:30:20.100ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79932025-03-07T23:30:20.100ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
79942025-03-07T23:30:20.100ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
79952025-03-07T23:30:20.100ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
79962025-03-07T23:30:20.100ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
79972025-03-07T23:30:20.101ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
79982025-03-07T23:30:20.108ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
79992025-03-07T23:30:20.108ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80002025-03-07T23:30:20.108ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80012025-03-07T23:30:20.111ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80022025-03-07T23:30:20.112ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
80032025-03-07T23:30:20.136ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
80042025-03-07T23:30:20.136ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
80052025-03-07T23:30:20.136ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
80062025-03-07T23:30:20.136ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
80072025-03-07T23:30:20.136ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
80082025-03-07T23:30:20.137ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
80092025-03-07T23:30:20.141ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80102025-03-07T23:30:20.141ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80112025-03-07T23:30:20.142ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80122025-03-07T23:30:20.149ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80132025-03-07T23:30:20.150ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
80142025-03-07T23:30:20.164ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
80152025-03-07T23:30:20.164ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
80162025-03-07T23:30:20.165ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
80172025-03-07T23:30:20.165ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
80182025-03-07T23:30:20.166ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
80192025-03-07T23:30:20.166ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
80202025-03-07T23:30:20.166ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
80212025-03-07T23:30:20.167ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
80222025-03-07T23:30:20.173ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
80232025-03-07T23:30:20.174ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
80242025-03-07T23:30:20.174ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80252025-03-07T23:30:20.205ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80262025-03-07T23:30:20.205ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80272025-03-07T23:30:20.205ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80282025-03-07T23:30:20.206ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80292025-03-07T23:30:20.456ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:57532/v2p
80302025-03-07T23:30:20.468ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:34458 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
80312025-03-07T23:30:20.472ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
80322025-03-07T23:30:20.472ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80332025-03-07T23:30:20.473ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80342025-03-07T23:30:20.473ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80352025-03-07T23:30:20.473ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80362025-03-07T23:30:20.475ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80372025-03-07T23:30:20.476ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
80382025-03-07T23:30:20.476ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
80392025-03-07T23:30:20.477ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:34458 req_id = 6d4e29b1-9fe7-4117-ab47-bea848041557 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80402025-03-07T23:30:20.477ZINFOtest_unauthorized (dropshot): request completed latency_us = 293 local_addr = [::1]:57532 method = GET remote_addr = [::1]:34458 req_id = 6d4e29b1-9fe7-4117-ab47-bea848041557 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80412025-03-07T23:30:20.477ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:57532/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "6d4e29b1-9fe7-4117-ab47-bea848041557", "content-length": "2", "date": "Fri, 07 Mar 2025 23:30:19 GMT"} })
80422025-03-07T23:30:20.477ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
80432025-03-07T23:30:20.477ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
80442025-03-07T23:30:20.477ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(137359) }] sled = sim-b6d65341
80452025-03-07T23:30:20.477ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = Some(Body) method = PUT uri = http://[::1]:57532/v2p
80462025-03-07T23:30:20.478ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:34458 req_id = 3aad5537-7422-407a-883f-11f9bd9d1095 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80472025-03-07T23:30:20.478ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80482025-03-07T23:30:20.478ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80492025-03-07T23:30:20.478ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80502025-03-07T23:30:20.479ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80512025-03-07T23:30:20.479ZINFOtest_unauthorized (dropshot): request completed latency_us = 1026 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:34458 req_id = 3aad5537-7422-407a-883f-11f9bd9d1095 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
80522025-03-07T23:30:20.481ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:57532/v2p", status: 204, headers: {"x-request-id": "3aad5537-7422-407a-883f-11f9bd9d1095", "date": "Fri, 07 Mar 2025 23:30:19 GMT"} })
80532025-03-07T23:30:20.482ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 502.625104ms iteration = 2 status = {}
80542025-03-07T23:30:20.483ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80552025-03-07T23:30:20.483ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80562025-03-07T23:30:20.483ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80572025-03-07T23:30:20.483ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80582025-03-07T23:30:20.487ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80592025-03-07T23:30:20.498ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80602025-03-07T23:30:20.498ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80612025-03-07T23:30:20.498ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80622025-03-07T23:30:20.499ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80632025-03-07T23:30:20.506ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80642025-03-07T23:30:20.506ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80652025-03-07T23:30:20.507ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80662025-03-07T23:30:20.518ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80672025-03-07T23:30:20.518ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80682025-03-07T23:30:20.519ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80692025-03-07T23:30:20.526ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80702025-03-07T23:30:20.526ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80712025-03-07T23:30:20.526ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80722025-03-07T23:30:20.530ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80732025-03-07T23:30:20.530ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80742025-03-07T23:30:20.531ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80752025-03-07T23:30:20.533ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80762025-03-07T23:30:20.533ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80772025-03-07T23:30:20.536ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80782025-03-07T23:30:20.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80792025-03-07T23:30:20.539ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80802025-03-07T23:30:20.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80812025-03-07T23:30:20.539ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80822025-03-07T23:30:20.540ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80832025-03-07T23:30:20.543ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80842025-03-07T23:30:20.543ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80852025-03-07T23:30:20.543ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80862025-03-07T23:30:20.544ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80872025-03-07T23:30:20.547ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80882025-03-07T23:30:20.547ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80892025-03-07T23:30:20.547ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80902025-03-07T23:30:20.553ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80912025-03-07T23:30:20.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
80922025-03-07T23:30:20.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
80932025-03-07T23:30:20.565ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80942025-03-07T23:30:20.581ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80952025-03-07T23:30:20.603ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80962025-03-07T23:30:20.603ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80972025-03-07T23:30:20.603ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80982025-03-07T23:30:20.603ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
80992025-03-07T23:30:20.605ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81002025-03-07T23:30:20.607ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81012025-03-07T23:30:20.608ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81022025-03-07T23:30:20.608ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81032025-03-07T23:30:20.608ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
81042025-03-07T23:30:20.623ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81052025-03-07T23:30:20.623ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81062025-03-07T23:30:20.624ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81072025-03-07T23:30:20.627ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81082025-03-07T23:30:20.676ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81092025-03-07T23:30:20.677ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81102025-03-07T23:30:20.677ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81112025-03-07T23:30:20.678ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81122025-03-07T23:30:20.690ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81132025-03-07T23:30:20.702ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81142025-03-07T23:30:20.702ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81152025-03-07T23:30:20.702ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81162025-03-07T23:30:20.703ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81172025-03-07T23:30:20.708ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81182025-03-07T23:30:20.708ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81192025-03-07T23:30:20.709ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81202025-03-07T23:30:20.716ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81212025-03-07T23:30:20.716ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81222025-03-07T23:30:20.717ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81232025-03-07T23:30:20.722ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81242025-03-07T23:30:20.722ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81252025-03-07T23:30:20.723ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81262025-03-07T23:30:20.727ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81272025-03-07T23:30:20.727ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81282025-03-07T23:30:20.727ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81292025-03-07T23:30:20.727ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81302025-03-07T23:30:20.727ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81312025-03-07T23:30:20.734ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81322025-03-07T23:30:20.734ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81332025-03-07T23:30:20.734ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81342025-03-07T23:30:20.735ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81352025-03-07T23:30:20.742ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81362025-03-07T23:30:20.742ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81372025-03-07T23:30:20.742ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81382025-03-07T23:30:20.745ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81392025-03-07T23:30:20.759ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81402025-03-07T23:30:20.793ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81412025-03-07T23:30:20.793ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81422025-03-07T23:30:20.793ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81432025-03-07T23:30:20.796ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81442025-03-07T23:30:20.796ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81452025-03-07T23:30:20.797ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81462025-03-07T23:30:20.810ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81472025-03-07T23:30:20.811ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81482025-03-07T23:30:20.819ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81492025-03-07T23:30:20.821ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81502025-03-07T23:30:20.832ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81512025-03-07T23:30:20.834ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81522025-03-07T23:30:20.834ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81532025-03-07T23:30:20.836ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81542025-03-07T23:30:20.845ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81552025-03-07T23:30:20.855ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") } result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81562025-03-07T23:30:20.855ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81572025-03-07T23:30:20.856ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81582025-03-07T23:30:20.856ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81592025-03-07T23:30:20.868ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {Name("default"): [NetworkInterface { id: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, kind: Instance { id: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(137359), primary: true, slot: 0, transit_ips: [] }]}
81602025-03-07T23:30:20.868ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, kind: Instance { id: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(137359), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: Some([Vpc(Vni(137359))]), filter_ports: None, filter_protocols: None, priority: 65534, status: Enabled, targets: [NetworkInterface { id: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, kind: Instance { id: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(137359), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("22")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, kind: Instance { id: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(137359), primary: true, slot: 0, transit_ips: [] }] }]
81612025-03-07T23:30:20.868ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81622025-03-07T23:30:20.868ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81632025-03-07T23:30:20.869ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81642025-03-07T23:30:20.878ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81652025-03-07T23:30:20.878ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81662025-03-07T23:30:20.878ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81672025-03-07T23:30:20.884ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
81682025-03-07T23:30:20.884ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
81692025-03-07T23:30:20.884ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81702025-03-07T23:30:20.884ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81712025-03-07T23:30:20.885ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81722025-03-07T23:30:20.887ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
81732025-03-07T23:30:20.893ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
81742025-03-07T23:30:21.017ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331
81752025-03-07T23:30:21.017ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:49688 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
81762025-03-07T23:30:21.018ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:49688 req_id = 162d68e2-a7a0-49ef-8641-a075acbaaf14 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331
81772025-03-07T23:30:21.024ZINFOtest_unauthorized (SledAgent): created id = d729e66e-f784-45dc-a942-a102e8bb8331 initial_state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }, migration_in: None, migration_out: None } kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
81782025-03-07T23:30:21.024ZINFOtest_unauthorized (dropshot): request completed latency_us = 5310 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:49688 req_id = 162d68e2-a7a0-49ef-8641-a075acbaaf14 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331
81792025-03-07T23:30:21.024ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331", status: 200, headers: {"content-type": "application/json", "x-request-id": "162d68e2-a7a0-49ef-8641-a075acbaaf14", "content-length": "131", "date": "Fri, 07 Mar 2025 23:30:20 GMT"} })
81802025-03-07T23:30:21.024ZINFOtest_unauthorized (SagaExecutor): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }
81812025-03-07T23:30:21.024ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81822025-03-07T23:30:21.024ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81832025-03-07T23:30:21.026ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRegistered
81842025-03-07T23:30:21.105ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
81852025-03-07T23:30:21.105ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-07T23:30:21.016307067Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:30:19.319697Z"), "time_deleted": Null}) node_id = 7 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
81862025-03-07T23:30:21.109ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
81872025-03-07T23:30:21.109ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
81882025-03-07T23:30:21.113ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = AddVirtualResources
81892025-03-07T23:30:21.113ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = AddVirtualResources
81902025-03-07T23:30:21.114ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = AddVirtualResources
81912025-03-07T23:30:21.128ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
81922025-03-07T23:30:21.128ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
81932025-03-07T23:30:21.131ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
81942025-03-07T23:30:21.131ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
81952025-03-07T23:30:21.133ZINFOtest_unauthorized (SagaExecutor): start saga: ensuring instance is running instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_reason = AutoStart
81962025-03-07T23:30:21.134ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
81972025-03-07T23:30:21.134ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
81982025-03-07T23:30:21.134ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
81992025-03-07T23:30:21.136ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
82002025-03-07T23:30:21.137ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
82012025-03-07T23:30:21.137ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
82022025-03-07T23:30:21.137ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
82032025-03-07T23:30:21.139ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
82042025-03-07T23:30:21.142ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
82052025-03-07T23:30:21.151ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
82062025-03-07T23:30:21.254ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
82072025-03-07T23:30:21.255ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:59443 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
82082025-03-07T23:30:21.256ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
82092025-03-07T23:30:21.256ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
82102025-03-07T23:30:21.256ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
82112025-03-07T23:30:21.258ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
82122025-03-07T23:30:21.259ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:59443 req_id = 85f2ca55-e143-455a-8fed-969cb5e43f47 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
82132025-03-07T23:30:21.259ZINFOtest_unauthorized (SledAgent): noop transition id = d729e66e-f784-45dc-a942-a102e8bb8331 kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 target = Running
82142025-03-07T23:30:21.259ZINFOtest_unauthorized (dropshot): request completed latency_us = 803 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:59443 req_id = 85f2ca55-e143-455a-8fed-969cb5e43f47 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
82152025-03-07T23:30:21.261ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "85f2ca55-e143-455a-8fed-969cb5e43f47", "content-length": "151", "date": "Fri, 07 Mar 2025 23:30:20 GMT"} })
82162025-03-07T23:30:21.262ZINFOtest_unauthorized (SagaExecutor): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRunning vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }
82172025-03-07T23:30:21.262ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRunning
82182025-03-07T23:30:21.262ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRunning
82192025-03-07T23:30:21.264ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_node = EnsureRunning
82202025-03-07T23:30:21.266ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
82212025-03-07T23:30:21.266ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
82222025-03-07T23:30:21.269ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
82232025-03-07T23:30:21.269ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
82242025-03-07T23:30:21.279ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
82252025-03-07T23:30:21.279ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
82262025-03-07T23:30:21.288ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
82272025-03-07T23:30:21.288ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
82282025-03-07T23:30:21.293ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
82292025-03-07T23:30:21.293ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 11 saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
82302025-03-07T23:30:21.296ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
82312025-03-07T23:30:21.296ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92
82322025-03-07T23:30:21.304ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
82332025-03-07T23:30:21.305ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92 saga_name = instance-start saga_result = SagaResult { saga_id: e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92, saga_log: SagaLog { saga_id: e9ea4f3a-c11b-46d7-bd1b-b23f5342ae92, unwinding: false, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N011 started, N011 succeeded], node_status: {0: Succeeded(String("d729e66e-f784-45dc-a942-a102e8bb8331")), 1: Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")), 2: Succeeded(String("::1:0")), 3: Succeeded(Object {"id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-07T23:30:19.319697Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:30:19.319697Z"), "time_deleted": Null}), 4: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:30:15.673460Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:15.673460Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:15.673460Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-07T23:30:21.016307067Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:30:19.319697Z"), "time_deleted": Null}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"dpd_ensure": Null, "ensure_registered": Object {"id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-07T23:30:21.016307067Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:30:19.319697Z"), "time_deleted": Null}, "ensure_running": Null, "propolis_id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "propolis_ip": String("::1:0"), "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "started_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "name": String("demo-instance"), "time_created": String("2025-03-07T23:30:15.673460Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:15.673460Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:15.673460Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}, "v2p_ensure": Null, "virtual_resources": Null, "vmm_record": Object {"id": String("d729e66e-f784-45dc-a942-a102e8bb8331"), "instance_id": String("2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-07T23:30:19.319697Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-07T23:30:19.319697Z"), "time_deleted": Null}} }) }
82342025-03-07T23:30:21.305ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } uri = /v1/instances?project=demo-project
82352025-03-07T23:30:21.305ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
82362025-03-07T23:30:21.305ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82372025-03-07T23:30:21.305ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82382025-03-07T23:30:21.306ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82392025-03-07T23:30:21.309ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
82402025-03-07T23:30:21.309ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82412025-03-07T23:30:21.309ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82422025-03-07T23:30:21.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82432025-03-07T23:30:21.314ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
82442025-03-07T23:30:21.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82452025-03-07T23:30:21.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82462025-03-07T23:30:21.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82472025-03-07T23:30:21.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
82482025-03-07T23:30:21.330ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) uri = /v1/instances?project=demo-project
82492025-03-07T23:30:21.330ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82502025-03-07T23:30:21.331ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82512025-03-07T23:30:21.332ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82522025-03-07T23:30:21.335ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82532025-03-07T23:30:21.335ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82542025-03-07T23:30:21.336ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82552025-03-07T23:30:21.336ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 4 reason = Signaled
82562025-03-07T23:30:21.336ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
82572025-03-07T23:30:21.336ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
82582025-03-07T23:30:21.336ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
82592025-03-07T23:30:21.336ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82602025-03-07T23:30:21.336ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82612025-03-07T23:30:21.337ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82622025-03-07T23:30:21.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82632025-03-07T23:30:21.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82642025-03-07T23:30:21.340ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82652025-03-07T23:30:21.340ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
82662025-03-07T23:30:21.345ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
82672025-03-07T23:30:21.345ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
82682025-03-07T23:30:21.345ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
82692025-03-07T23:30:21.346ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82702025-03-07T23:30:21.346ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82712025-03-07T23:30:21.346ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82722025-03-07T23:30:21.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82732025-03-07T23:30:21.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82742025-03-07T23:30:21.349ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82752025-03-07T23:30:21.349ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
82762025-03-07T23:30:21.360ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
82772025-03-07T23:30:21.360ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
82782025-03-07T23:30:21.360ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
82792025-03-07T23:30:21.363ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
82802025-03-07T23:30:21.363ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
82812025-03-07T23:30:21.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } uri = /v1/instances?project=demo-project
82822025-03-07T23:30:21.364ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
82832025-03-07T23:30:21.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82842025-03-07T23:30:21.364ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82852025-03-07T23:30:21.366ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82862025-03-07T23:30:21.485ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
82872025-03-07T23:30:21.485ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
82882025-03-07T23:30:21.486ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
82892025-03-07T23:30:21.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
82902025-03-07T23:30:21.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
82912025-03-07T23:30:21.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
82922025-03-07T23:30:21.488ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:33297 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
82932025-03-07T23:30:21.488ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
82942025-03-07T23:30:21.489ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
82952025-03-07T23:30:21.489ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 434c362e-27d4-4947-878c-24cdcdbb3949 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
82962025-03-07T23:30:21.489ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:33297 req_id = f6bb01e8-6938-44c7-bb30-669e2858e0b4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
82972025-03-07T23:30:21.490ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 434c362e-27d4-4947-878c-24cdcdbb3949 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
82982025-03-07T23:30:21.490ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 434c362e-27d4-4947-878c-24cdcdbb3949 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
82992025-03-07T23:30:21.490ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 434c362e-27d4-4947-878c-24cdcdbb3949 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
83002025-03-07T23:30:21.491ZINFOtest_unauthorized (dropshot): request completed latency_us = 1194 local_addr = [::1]:57532 method = GET remote_addr = [::1]:33297 req_id = f6bb01e8-6938-44c7-bb30-669e2858e0b4 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
83012025-03-07T23:30:21.491ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "f6bb01e8-6938-44c7-bb30-669e2858e0b4", "content-length": "150", "date": "Fri, 07 Mar 2025 23:30:20 GMT"} })
83022025-03-07T23:30:21.491ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83032025-03-07T23:30:21.491ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83042025-03-07T23:30:21.492ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83052025-03-07T23:30:21.492ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
83062025-03-07T23:30:21.492ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
83072025-03-07T23:30:21.492ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83082025-03-07T23:30:21.492ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83092025-03-07T23:30:21.494ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5007 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 434c362e-27d4-4947-878c-24cdcdbb3949 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
83102025-03-07T23:30:21.497ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "434c362e-27d4-4947-878c-24cdcdbb3949", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:20 GMT"} })
83112025-03-07T23:30:21.497ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
83122025-03-07T23:30:21.497ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
83132025-03-07T23:30:21.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) uri = /v1/instances?project=demo-project
83142025-03-07T23:30:21.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } uri = /v1/instances?project=demo-project
83152025-03-07T23:30:21.510ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
83162025-03-07T23:30:21.510ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
83172025-03-07T23:30:21.510ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83182025-03-07T23:30:21.510ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83192025-03-07T23:30:21.511ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 670d75dd-2466-4d7c-850a-65864f455748 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
83202025-03-07T23:30:21.511ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 670d75dd-2466-4d7c-850a-65864f455748 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
83212025-03-07T23:30:21.511ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 670d75dd-2466-4d7c-850a-65864f455748 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
83222025-03-07T23:30:21.512ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 670d75dd-2466-4d7c-850a-65864f455748 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
83232025-03-07T23:30:21.514ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
83242025-03-07T23:30:21.514ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
83252025-03-07T23:30:21.514ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83262025-03-07T23:30:21.515ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83272025-03-07T23:30:21.516ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4694 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 670d75dd-2466-4d7c-850a-65864f455748 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
83282025-03-07T23:30:21.516ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b: {10.0.0.0: {faa36720-8d06-4c5a-8e59-3859e80311a0}, 10.0.0.1: {faa36720-8d06-4c5a-8e59-3859e80311a0}}} background_task = vpc_route_manager sled = sim-b6d65341
83292025-03-07T23:30:21.516ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
83302025-03-07T23:30:21.517ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:33297 req_id = bb03f127-ed6e-417a-89e0-cc4604ff783a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
83312025-03-07T23:30:21.517ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "670d75dd-2466-4d7c-850a-65864f455748", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:20 GMT"} })
83322025-03-07T23:30:21.517ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
83332025-03-07T23:30:21.517ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83342025-03-07T23:30:21.517ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
83352025-03-07T23:30:21.518ZINFOtest_unauthorized (dropshot): request completed latency_us = 783 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:33297 req_id = bb03f127-ed6e-417a-89e0-cc4604ff783a response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
83362025-03-07T23:30:21.518ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
83372025-03-07T23:30:21.518ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
83382025-03-07T23:30:21.518ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83392025-03-07T23:30:21.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83402025-03-07T23:30:21.522ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "bb03f127-ed6e-417a-89e0-cc4604ff783a", "date": "Fri, 07 Mar 2025 23:30:20 GMT"} })
83412025-03-07T23:30:21.522ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83422025-03-07T23:30:21.522ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83432025-03-07T23:30:21.522ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83442025-03-07T23:30:21.522ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
83452025-03-07T23:30:21.539ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ById(2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc) } result = Ok(()) uri = /v1/instances?project=demo-project
83462025-03-07T23:30:21.540ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database uri = /v1/instances?project=demo-project
83472025-03-07T23:30:21.540ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
83482025-03-07T23:30:21.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
83492025-03-07T23:30:21.543ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83502025-03-07T23:30:21.543ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83512025-03-07T23:30:21.544ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83522025-03-07T23:30:21.545ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 6276557 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e001c52-1bd6-49f4-9378-92cbeee4f5e7 response_code = 201 uri = /v1/instances?project=demo-project
83532025-03-07T23:30:21.546ZINFOtest_unauthorized (external client test context): client received response status = 201
83542025-03-07T23:30:21.546ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances?project=demo-project
83552025-03-07T23:30:21.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f uri = /v1/instances?project=demo-project
83562025-03-07T23:30:21.553ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f uri = /v1/instances?project=demo-project
83572025-03-07T23:30:21.553ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
83582025-03-07T23:30:21.553ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83592025-03-07T23:30:21.553ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83602025-03-07T23:30:21.554ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83612025-03-07T23:30:21.557ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83622025-03-07T23:30:21.557ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83632025-03-07T23:30:21.557ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83642025-03-07T23:30:21.559ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83652025-03-07T23:30:21.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83662025-03-07T23:30:21.559ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83672025-03-07T23:30:21.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83682025-03-07T23:30:21.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83692025-03-07T23:30:21.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
83702025-03-07T23:30:21.562ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
83712025-03-07T23:30:21.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83722025-03-07T23:30:21.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83732025-03-07T23:30:21.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83742025-03-07T23:30:21.565ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83752025-03-07T23:30:21.565ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83762025-03-07T23:30:21.566ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83772025-03-07T23:30:21.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
83782025-03-07T23:30:21.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83792025-03-07T23:30:21.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83802025-03-07T23:30:21.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83812025-03-07T23:30:21.569ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83822025-03-07T23:30:21.570ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83832025-03-07T23:30:21.570ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83842025-03-07T23:30:21.570ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
83852025-03-07T23:30:21.570ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83862025-03-07T23:30:21.570ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83872025-03-07T23:30:21.571ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83882025-03-07T23:30:21.572ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
83892025-03-07T23:30:21.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
83902025-03-07T23:30:21.581ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83912025-03-07T23:30:21.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
83922025-03-07T23:30:21.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
83932025-03-07T23:30:21.581ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
83942025-03-07T23:30:21.582ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
83952025-03-07T23:30:21.584ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
83962025-03-07T23:30:21.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
83972025-03-07T23:30:21.585ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
83982025-03-07T23:30:21.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
83992025-03-07T23:30:21.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
84002025-03-07T23:30:21.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
84012025-03-07T23:30:21.588ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84022025-03-07T23:30:21.588ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84032025-03-07T23:30:21.591ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84042025-03-07T23:30:21.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
84052025-03-07T23:30:21.593ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
84062025-03-07T23:30:21.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
84072025-03-07T23:30:21.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
84082025-03-07T23:30:21.597ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) }
84092025-03-07T23:30:21.597ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
84102025-03-07T23:30:21.597ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84112025-03-07T23:30:21.598ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84122025-03-07T23:30:21.598ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84132025-03-07T23:30:21.599ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
84142025-03-07T23:30:21.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
84152025-03-07T23:30:21.604ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f uri = /v1/instances?project=demo-project
84162025-03-07T23:30:21.604ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84172025-03-07T23:30:21.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84182025-03-07T23:30:21.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84192025-03-07T23:30:21.610ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
84202025-03-07T23:30:21.610ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84212025-03-07T23:30:21.610ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84222025-03-07T23:30:21.611ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84232025-03-07T23:30:21.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84242025-03-07T23:30:21.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84252025-03-07T23:30:21.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84262025-03-07T23:30:21.615ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
84272025-03-07T23:30:21.615ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84282025-03-07T23:30:21.615ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84292025-03-07T23:30:21.616ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84302025-03-07T23:30:21.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
84312025-03-07T23:30:21.616ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
84322025-03-07T23:30:21.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84332025-03-07T23:30:21.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84342025-03-07T23:30:21.618ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84352025-03-07T23:30:21.622ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
84362025-03-07T23:30:21.646ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(())
84372025-03-07T23:30:21.646ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user background_task = vpc_route_manager
84382025-03-07T23:30:21.646ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) }
84392025-03-07T23:30:21.646ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
84402025-03-07T23:30:21.646ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84412025-03-07T23:30:21.646ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84422025-03-07T23:30:21.647ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84432025-03-07T23:30:21.660ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
84442025-03-07T23:30:21.660ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84452025-03-07T23:30:21.686ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84462025-03-07T23:30:21.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84472025-03-07T23:30:21.691ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
84482025-03-07T23:30:21.691ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84492025-03-07T23:30:21.691ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84502025-03-07T23:30:21.693ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84512025-03-07T23:30:21.693ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
84522025-03-07T23:30:21.693ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84532025-03-07T23:30:21.693ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84542025-03-07T23:30:21.694ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84552025-03-07T23:30:21.696ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
84562025-03-07T23:30:21.706ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
84572025-03-07T23:30:21.706ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84582025-03-07T23:30:21.706ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84592025-03-07T23:30:21.707ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84602025-03-07T23:30:21.707ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
84612025-03-07T23:30:21.707ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84622025-03-07T23:30:21.707ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84632025-03-07T23:30:21.708ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84642025-03-07T23:30:21.709ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84652025-03-07T23:30:21.709ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84662025-03-07T23:30:21.710ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84672025-03-07T23:30:21.710ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
84682025-03-07T23:30:21.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(())
84692025-03-07T23:30:21.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84702025-03-07T23:30:21.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84712025-03-07T23:30:21.725ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84722025-03-07T23:30:21.727ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
84732025-03-07T23:30:21.727ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
84742025-03-07T23:30:21.727ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84752025-03-07T23:30:21.727ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84762025-03-07T23:30:21.728ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84772025-03-07T23:30:21.732ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84782025-03-07T23:30:21.732ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84792025-03-07T23:30:21.732ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84802025-03-07T23:30:21.733ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
84812025-03-07T23:30:21.733ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84822025-03-07T23:30:21.733ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84832025-03-07T23:30:21.736ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84842025-03-07T23:30:21.738ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84852025-03-07T23:30:21.738ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84862025-03-07T23:30:21.740ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84872025-03-07T23:30:21.744ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84882025-03-07T23:30:21.744ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84892025-03-07T23:30:21.746ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
84902025-03-07T23:30:21.746ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
84912025-03-07T23:30:21.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
84922025-03-07T23:30:21.755ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=demo-project
84932025-03-07T23:30:21.755ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
84942025-03-07T23:30:21.755ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
84952025-03-07T23:30:21.755ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
84962025-03-07T23:30:21.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
84972025-03-07T23:30:21.758ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
84982025-03-07T23:30:21.760ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
84992025-03-07T23:30:21.761ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85002025-03-07T23:30:21.762ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
85012025-03-07T23:30:21.762ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
85022025-03-07T23:30:21.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
85032025-03-07T23:30:21.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
85042025-03-07T23:30:21.763ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ById(81d663ad-afb5-4444-9e4c-156a9f15d2a3) }
85052025-03-07T23:30:21.763ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
85062025-03-07T23:30:21.763ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85072025-03-07T23:30:21.763ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85082025-03-07T23:30:21.764ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85092025-03-07T23:30:21.771ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
85102025-03-07T23:30:21.774ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=demo-project
85112025-03-07T23:30:21.775ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
85122025-03-07T23:30:21.775ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
85132025-03-07T23:30:21.775ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
85142025-03-07T23:30:21.775ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
85152025-03-07T23:30:21.775ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85162025-03-07T23:30:21.775ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85172025-03-07T23:30:21.776ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85182025-03-07T23:30:21.784ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
85192025-03-07T23:30:21.784ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
85202025-03-07T23:30:21.784ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
85212025-03-07T23:30:21.784ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
85222025-03-07T23:30:21.785ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
85232025-03-07T23:30:21.786ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
85242025-03-07T23:30:21.786ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85252025-03-07T23:30:21.786ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85262025-03-07T23:30:21.787ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85272025-03-07T23:30:21.790ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
85282025-03-07T23:30:21.793ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
85292025-03-07T23:30:21.793ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
85302025-03-07T23:30:21.793ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
85312025-03-07T23:30:21.794ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
85322025-03-07T23:30:21.797ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
85332025-03-07T23:30:21.810ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ById(81d663ad-afb5-4444-9e4c-156a9f15d2a3) } result = Ok(())
85342025-03-07T23:30:21.841ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
85352025-03-07T23:30:21.841ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85362025-03-07T23:30:21.841ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85372025-03-07T23:30:21.842ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85382025-03-07T23:30:21.846ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create
85392025-03-07T23:30:21.852ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"52d5748c-72ad-4b84-a177-f155857102c8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"3cb4ace2-9552-42eb-a6ec-9816eea27c54","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"eda0fda6-e1bd-4e57-8dd0-84be29940a07","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"9322b608-6c35-47fa-aeeb-2ea71a9a7ebd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"44b925fa-aacf-4cca-94dc-47c9d9936abd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"3af7ef94-38c2-4afe-928c-1d8b506336e5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"0d1db6c8-0481-4dfe-8e18-d11e70feb329","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"ca7990c6-6c68-4b08-b7ac-a8d4ab92eb9f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"75bdc1b0-921f-498b-a70e-b04fb3118e1b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"ff494495-7930-470c-bdaf-7512da8c9174","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"0c47bb39-14bd-40f1-a551-b71bdb743b74","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"b894266f-d3de-46f2-a97c-56812e5ac154","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"d9bed123-c9e3-4922-a338-a3991f5f1224","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"59b6dc6e-36e0-417f-8937-dd267e948cae","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"8eff62cd-a940-4081-8049-77dbc80d2d05","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"01bd76ea-059a-4311-9e4c-3d6529f0aae8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"7131f213-48f5-4f00-9a21-aec722ba1e60","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"90366dc7-fd43-4eff-b137-cf89a45abf6d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"9029ff68-2370-4f3c-9ba4-10ce6a050438","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"33751a32-22ef-400b-84e0-0352ea0d0ddf","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"02dab528-c62c-48bc-a617-519b6054fa98","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"57d38196-7c3e-4d68-8184-230713dc4950","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"2f3c7351-b25e-4def-9517-e120edc77782","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"6ef0e1d7-6318-4ea6-9e38-e401c5037de1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"6a9a16b4-6387-4505-acd4-02dc77786bdd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"85779176-eb5f-4698-b5ca-fef6a6a174ef","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"7479ca0f-f43a-4b6b-b208-b702fe6997b0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"de4487e7-4557-4ce0-b6b5-4e286a06e4e4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"683869fb-5b52-40da-9a43-335967c244b1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"642e52bd-b0c5-4dfd-a837-a404dff997a0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"5806c347-6295-47e3-98e8-29476d645e75","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"702d6071-b051-4ba1-8797-7cf14ab84851","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"cb550e14-1a14-4b52-b415-129861f5acbe","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"6d8ec643-d9b4-44cc-96f2-4a2a483ba24f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"0ec2841f-a66f-41f7-bda9-2c386a07bae1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"dc1e8bb1-7718-43dd-a84b-a085242641ad","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"59c53804-9292-47e4-902b-124deaddc36f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"89ebe751-1d71-48a8-acd0-36d950b58785","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"3e1b26f8-b9a8-432f-896b-5197ac7cab62","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","new_id":"9aea0fe3-43b3-4796-bdff-70555c2ad07f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"","disks":[],"external_ips":[{"pool":"default","type":"ephemeral"}],"hostname":"demo-instance","memory":17179869184,"name":"demo-stopped-instance","ncpus":1,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":""},"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167} saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
85402025-03-07T23:30:21.856ZINFOtest_unauthorized (SecStore): creating saga saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create
85412025-03-07T23:30:21.866ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85422025-03-07T23:30:21.866ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85432025-03-07T23:30:21.868ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85442025-03-07T23:30:21.874ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85452025-03-07T23:30:21.874ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85462025-03-07T23:30:21.875ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85472025-03-07T23:30:21.879ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85482025-03-07T23:30:21.879ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85492025-03-07T23:30:21.880ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85502025-03-07T23:30:21.889ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") }
85512025-03-07T23:30:21.889ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
85522025-03-07T23:30:21.889ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85532025-03-07T23:30:21.889ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85542025-03-07T23:30:21.890ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85552025-03-07T23:30:21.892ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
85562025-03-07T23:30:21.892ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85572025-03-07T23:30:21.892ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85582025-03-07T23:30:21.892ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85592025-03-07T23:30:21.896ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
85602025-03-07T23:30:21.896ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85612025-03-07T23:30:21.896ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85622025-03-07T23:30:21.897ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85632025-03-07T23:30:21.899ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
85642025-03-07T23:30:21.916ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } result = Ok(())
85652025-03-07T23:30:21.916ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
85662025-03-07T23:30:21.916ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85672025-03-07T23:30:21.916ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85682025-03-07T23:30:21.916ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85692025-03-07T23:30:21.920ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85702025-03-07T23:30:21.920ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85712025-03-07T23:30:21.920ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85722025-03-07T23:30:21.928ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85732025-03-07T23:30:21.928ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85742025-03-07T23:30:21.929ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85752025-03-07T23:30:21.931ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create
85762025-03-07T23:30:21.931ZINFOtest_unauthorized (SEC): saga start saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
85772025-03-07T23:30:21.931ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
85782025-03-07T23:30:21.932ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 167 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
85792025-03-07T23:30:21.934ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85802025-03-07T23:30:21.934ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85812025-03-07T23:30:21.935ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85822025-03-07T23:30:21.938ZDEBGtest_unauthorized (SEC): saga log event new_state = N167 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
85832025-03-07T23:30:21.938ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 167 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
85842025-03-07T23:30:21.940ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: faa36720-8d06-4c5a-8e59-3859e80311a0, lookup_type: ByName("default") }
85852025-03-07T23:30:21.941ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
85862025-03-07T23:30:21.941ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85872025-03-07T23:30:21.941ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85882025-03-07T23:30:21.942ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85892025-03-07T23:30:21.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
85902025-03-07T23:30:21.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
85912025-03-07T23:30:21.947ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
85922025-03-07T23:30:21.947ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85932025-03-07T23:30:21.947ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
85942025-03-07T23:30:21.948ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
85952025-03-07T23:30:21.949ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
85962025-03-07T23:30:21.949ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8")) node_id = 0 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
85972025-03-07T23:30:21.952ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
85982025-03-07T23:30:21.952ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
85992025-03-07T23:30:21.952ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
86002025-03-07T23:30:21.954ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
86012025-03-07T23:30:21.956ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86022025-03-07T23:30:21.956ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86032025-03-07T23:30:21.956ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
86042025-03-07T23:30:21.974ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: faa36720-8d06-4c5a-8e59-3859e80311a0, lookup_type: ByName("default") } result = Ok(())
86052025-03-07T23:30:21.974ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user background_task = vpc_route_manager
86062025-03-07T23:30:21.974ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/vpc-routes
86072025-03-07T23:30:21.974ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:33297 req_id = f146a299-254f-40ea-9943-a5786a3167ef sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
86082025-03-07T23:30:21.974ZINFOtest_unauthorized (dropshot): request completed latency_us = 977 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:33297 req_id = f146a299-254f-40ea-9943-a5786a3167ef response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
86092025-03-07T23:30:21.974ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 204, headers: {"x-request-id": "f146a299-254f-40ea-9943-a5786a3167ef", "date": "Fri, 07 Mar 2025 23:30:21 GMT"} })
86102025-03-07T23:30:21.975ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 638.671294ms iteration = 4 status = {}
86112025-03-07T23:30:21.977ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86122025-03-07T23:30:21.977ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86132025-03-07T23:30:21.979ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86142025-03-07T23:30:21.982ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86152025-03-07T23:30:21.982ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86162025-03-07T23:30:21.982ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86172025-03-07T23:30:21.985ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86182025-03-07T23:30:21.985ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86192025-03-07T23:30:21.985ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86202025-03-07T23:30:21.985ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86212025-03-07T23:30:21.985ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86222025-03-07T23:30:21.988ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86232025-03-07T23:30:21.988ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86242025-03-07T23:30:21.988ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86252025-03-07T23:30:21.988ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86262025-03-07T23:30:21.992ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86272025-03-07T23:30:21.992ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86282025-03-07T23:30:21.992ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86292025-03-07T23:30:21.992ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86302025-03-07T23:30:21.995ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86312025-03-07T23:30:22.006ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86322025-03-07T23:30:22.006ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86332025-03-07T23:30:22.006ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86342025-03-07T23:30:22.006ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86352025-03-07T23:30:22.006ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86362025-03-07T23:30:22.007ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86372025-03-07T23:30:22.010ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86382025-03-07T23:30:22.010ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86392025-03-07T23:30:22.010ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86402025-03-07T23:30:22.011ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86412025-03-07T23:30:22.014ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86422025-03-07T23:30:22.014ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86432025-03-07T23:30:22.014ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86442025-03-07T23:30:22.015ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86452025-03-07T23:30:22.018ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86462025-03-07T23:30:22.027ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86472025-03-07T23:30:22.027ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86482025-03-07T23:30:22.027ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86492025-03-07T23:30:22.028ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateInstanceRecord
86502025-03-07T23:30:22.035ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86512025-03-07T23:30:22.035ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "name": String("demo-stopped-instance"), "time_created": String("2025-03-07T23:30:21.977298Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:21.977298Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:21.977298Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}) node_id = 1 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86522025-03-07T23:30:22.041ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86532025-03-07T23:30:22.041ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86542025-03-07T23:30:22.044ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86552025-03-07T23:30:22.045ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86562025-03-07T23:30:22.045ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86572025-03-07T23:30:22.049ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86582025-03-07T23:30:22.049ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86592025-03-07T23:30:22.050ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86602025-03-07T23:30:22.051ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86612025-03-07T23:30:22.051ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86622025-03-07T23:30:22.051ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86632025-03-07T23:30:22.051ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86642025-03-07T23:30:22.052ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86652025-03-07T23:30:22.055ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86662025-03-07T23:30:22.055ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86672025-03-07T23:30:22.055ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86682025-03-07T23:30:22.056ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86692025-03-07T23:30:22.059ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86702025-03-07T23:30:22.062ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86712025-03-07T23:30:22.062ZTRACtest_unauthorized (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86722025-03-07T23:30:22.062ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86732025-03-07T23:30:22.062ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86742025-03-07T23:30:22.062ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86752025-03-07T23:30:22.063ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86762025-03-07T23:30:22.068ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86772025-03-07T23:30:22.068ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86782025-03-07T23:30:22.068ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86792025-03-07T23:30:22.069ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86802025-03-07T23:30:22.072ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86812025-03-07T23:30:22.075ZDEBGtest_unauthorized (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = AssociateSshKeys
86822025-03-07T23:30:22.075ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86832025-03-07T23:30:22.075ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86842025-03-07T23:30:22.078ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86852025-03-07T23:30:22.079ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86862025-03-07T23:30:22.083ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86872025-03-07T23:30:22.083ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("52d5748c-72ad-4b84-a177-f155857102c8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 3 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86882025-03-07T23:30:22.087ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86892025-03-07T23:30:22.087ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86902025-03-07T23:30:22.089ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86912025-03-07T23:30:22.089ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86922025-03-07T23:30:22.092ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
86932025-03-07T23:30:22.092ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
86942025-03-07T23:30:22.096ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
86952025-03-07T23:30:22.096ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
86962025-03-07T23:30:22.097ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
86972025-03-07T23:30:22.099ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
86982025-03-07T23:30:22.099ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
86992025-03-07T23:30:22.101ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87002025-03-07T23:30:22.103ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87012025-03-07T23:30:22.103ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87022025-03-07T23:30:22.104ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87032025-03-07T23:30:22.106ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87042025-03-07T23:30:22.106ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87052025-03-07T23:30:22.106ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87062025-03-07T23:30:22.106ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87072025-03-07T23:30:22.107ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87082025-03-07T23:30:22.110ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87092025-03-07T23:30:22.110ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87102025-03-07T23:30:22.110ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87112025-03-07T23:30:22.111ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87122025-03-07T23:30:22.116ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87132025-03-07T23:30:22.116ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87142025-03-07T23:30:22.117ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87152025-03-07T23:30:22.118ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87162025-03-07T23:30:22.121ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87172025-03-07T23:30:22.136ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87182025-03-07T23:30:22.136ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87192025-03-07T23:30:22.136ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87202025-03-07T23:30:22.139ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87212025-03-07T23:30:22.141ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87222025-03-07T23:30:22.141ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87232025-03-07T23:30:22.143ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87242025-03-07T23:30:22.145ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87252025-03-07T23:30:22.145ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87262025-03-07T23:30:22.146ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87272025-03-07T23:30:22.150ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87282025-03-07T23:30:22.150ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87292025-03-07T23:30:22.151ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87302025-03-07T23:30:22.154ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87312025-03-07T23:30:22.154ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87322025-03-07T23:30:22.154ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87332025-03-07T23:30:22.154ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87342025-03-07T23:30:22.155ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87352025-03-07T23:30:22.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
87362025-03-07T23:30:22.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
87372025-03-07T23:30:22.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
87382025-03-07T23:30:22.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
87392025-03-07T23:30:22.160ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87402025-03-07T23:30:22.160ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87412025-03-07T23:30:22.160ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87422025-03-07T23:30:22.162ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87432025-03-07T23:30:22.163ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
87442025-03-07T23:30:22.163ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
87452025-03-07T23:30:22.165ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87462025-03-07T23:30:22.166ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87472025-03-07T23:30:22.166ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87482025-03-07T23:30:22.167ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87492025-03-07T23:30:22.168ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
87502025-03-07T23:30:22.168ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
87512025-03-07T23:30:22.171ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87522025-03-07T23:30:22.189ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87532025-03-07T23:30:22.189ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87542025-03-07T23:30:22.189ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87552025-03-07T23:30:22.189ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87562025-03-07T23:30:22.189ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87572025-03-07T23:30:22.191ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87582025-03-07T23:30:22.208ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87592025-03-07T23:30:22.208ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87602025-03-07T23:30:22.208ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87612025-03-07T23:30:22.209ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87622025-03-07T23:30:22.214ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87632025-03-07T23:30:22.214ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87642025-03-07T23:30:22.214ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87652025-03-07T23:30:22.215ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87662025-03-07T23:30:22.218ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87672025-03-07T23:30:22.238ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87682025-03-07T23:30:22.238ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87692025-03-07T23:30:22.238ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87702025-03-07T23:30:22.238ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87712025-03-07T23:30:22.238ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87722025-03-07T23:30:22.239ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87732025-03-07T23:30:22.243ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87742025-03-07T23:30:22.244ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87752025-03-07T23:30:22.244ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87762025-03-07T23:30:22.245ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87772025-03-07T23:30:22.249ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87782025-03-07T23:30:22.249ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87792025-03-07T23:30:22.249ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87802025-03-07T23:30:22.249ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87812025-03-07T23:30:22.253ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87822025-03-07T23:30:22.269ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ByName("default") }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87832025-03-07T23:30:22.269ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87842025-03-07T23:30:22.269ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87852025-03-07T23:30:22.270ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87862025-03-07T23:30:22.270ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
87872025-03-07T23:30:22.305ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87882025-03-07T23:30:22.305ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87892025-03-07T23:30:22.306ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateNetworkInterface0
87902025-03-07T23:30:22.310ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
87912025-03-07T23:30:22.310ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
87922025-03-07T23:30:22.314ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
87932025-03-07T23:30:22.314ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
87942025-03-07T23:30:22.317ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
87952025-03-07T23:30:22.318ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
87962025-03-07T23:30:22.322ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
87972025-03-07T23:30:22.322ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
87982025-03-07T23:30:22.326ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
87992025-03-07T23:30:22.326ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3cb4ace2-9552-42eb-a6ec-9816eea27c54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 7 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88002025-03-07T23:30:22.331ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88012025-03-07T23:30:22.331ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88022025-03-07T23:30:22.335ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88032025-03-07T23:30:22.335ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88042025-03-07T23:30:22.338ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88052025-03-07T23:30:22.338ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88062025-03-07T23:30:22.341ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88072025-03-07T23:30:22.341ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88082025-03-07T23:30:22.346ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88092025-03-07T23:30:22.346ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88102025-03-07T23:30:22.356ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88112025-03-07T23:30:22.356ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88122025-03-07T23:30:22.370ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88132025-03-07T23:30:22.370ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88142025-03-07T23:30:22.379ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88152025-03-07T23:30:22.379ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("eda0fda6-e1bd-4e57-8dd0-84be29940a07"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 11 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88162025-03-07T23:30:22.413ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88172025-03-07T23:30:22.414ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88182025-03-07T23:30:22.420ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88192025-03-07T23:30:22.420ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88202025-03-07T23:30:22.426ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88212025-03-07T23:30:22.427ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88222025-03-07T23:30:22.430ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88232025-03-07T23:30:22.430ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88242025-03-07T23:30:22.434ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88252025-03-07T23:30:22.434ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88262025-03-07T23:30:22.437ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88272025-03-07T23:30:22.437ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88282025-03-07T23:30:22.439ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88292025-03-07T23:30:22.439ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88302025-03-07T23:30:22.442ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88312025-03-07T23:30:22.442ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9322b608-6c35-47fa-aeeb-2ea71a9a7ebd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 15 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88322025-03-07T23:30:22.445ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88332025-03-07T23:30:22.445ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88342025-03-07T23:30:22.448ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88352025-03-07T23:30:22.448ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88362025-03-07T23:30:22.450ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88372025-03-07T23:30:22.450ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88382025-03-07T23:30:22.454ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88392025-03-07T23:30:22.454ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88402025-03-07T23:30:22.457ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88412025-03-07T23:30:22.457ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88422025-03-07T23:30:22.462ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88432025-03-07T23:30:22.462ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88442025-03-07T23:30:22.465ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88452025-03-07T23:30:22.465ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88462025-03-07T23:30:22.468ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88472025-03-07T23:30:22.468ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("44b925fa-aacf-4cca-94dc-47c9d9936abd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 19 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88482025-03-07T23:30:22.472ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88492025-03-07T23:30:22.472ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88502025-03-07T23:30:22.476ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88512025-03-07T23:30:22.476ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88522025-03-07T23:30:22.480ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88532025-03-07T23:30:22.480ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88542025-03-07T23:30:22.486ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88552025-03-07T23:30:22.486ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88562025-03-07T23:30:22.497ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88572025-03-07T23:30:22.497ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 22 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88582025-03-07T23:30:22.500ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88592025-03-07T23:30:22.500ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88602025-03-07T23:30:22.540ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88612025-03-07T23:30:22.540ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 23 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88622025-03-07T23:30:22.547ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88632025-03-07T23:30:22.547ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3af7ef94-38c2-4afe-928c-1d8b506336e5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 23 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88642025-03-07T23:30:22.552ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88652025-03-07T23:30:22.552ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 24 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88662025-03-07T23:30:22.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88672025-03-07T23:30:22.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88682025-03-07T23:30:22.563ZDEBGtest_unauthorized (SEC): saga log event new_state = N024 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88692025-03-07T23:30:22.563ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 24 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88702025-03-07T23:30:22.565ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88712025-03-07T23:30:22.566ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88722025-03-07T23:30:22.566ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88732025-03-07T23:30:22.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
88742025-03-07T23:30:22.603ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88752025-03-07T23:30:22.604ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 25 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88762025-03-07T23:30:22.632ZDEBGtest_unauthorized (SEC): saga log event new_state = N025 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88772025-03-07T23:30:22.632ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 25 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88782025-03-07T23:30:22.637ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88792025-03-07T23:30:22.640ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 26 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88802025-03-07T23:30:22.666ZDEBGtest_unauthorized (SEC): saga log event new_state = N026 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88812025-03-07T23:30:22.666ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 26 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88822025-03-07T23:30:22.678ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88832025-03-07T23:30:22.678ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 27 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88842025-03-07T23:30:22.683ZDEBGtest_unauthorized (SEC): saga log event new_state = N027 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88852025-03-07T23:30:22.684ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0d1db6c8-0481-4dfe-8e18-d11e70feb329"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 27 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88862025-03-07T23:30:22.697ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88872025-03-07T23:30:22.697ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 28 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88882025-03-07T23:30:22.703ZDEBGtest_unauthorized (SEC): saga log event new_state = N028 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88892025-03-07T23:30:22.704ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 28 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88902025-03-07T23:30:22.720ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88912025-03-07T23:30:22.720ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 29 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88922025-03-07T23:30:22.728ZDEBGtest_unauthorized (SEC): saga log event new_state = N029 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88932025-03-07T23:30:22.728ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 29 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88942025-03-07T23:30:22.733ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88952025-03-07T23:30:22.733ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 30 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88962025-03-07T23:30:22.738ZDEBGtest_unauthorized (SEC): saga log event new_state = N030 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88972025-03-07T23:30:22.738ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 30 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
88982025-03-07T23:30:22.754ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
88992025-03-07T23:30:22.754ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 31 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89002025-03-07T23:30:22.759ZDEBGtest_unauthorized (SEC): saga log event new_state = N031 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89012025-03-07T23:30:22.759ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("ca7990c6-6c68-4b08-b7ac-a8d4ab92eb9f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 31 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89022025-03-07T23:30:22.768ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89032025-03-07T23:30:22.768ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 32 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89042025-03-07T23:30:22.776ZDEBGtest_unauthorized (SEC): saga log event new_state = N032 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89052025-03-07T23:30:22.776ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 32 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89062025-03-07T23:30:22.785ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89072025-03-07T23:30:22.785ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 33 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89082025-03-07T23:30:22.792ZDEBGtest_unauthorized (SEC): saga log event new_state = N033 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89092025-03-07T23:30:22.792ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 33 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89102025-03-07T23:30:22.806ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89112025-03-07T23:30:22.806ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 34 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89122025-03-07T23:30:22.815ZDEBGtest_unauthorized (SEC): saga log event new_state = N034 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89132025-03-07T23:30:22.815ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 34 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89142025-03-07T23:30:22.822ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89152025-03-07T23:30:22.822ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 35 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89162025-03-07T23:30:22.829ZDEBGtest_unauthorized (SEC): saga log event new_state = N035 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89172025-03-07T23:30:22.829ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("cb6c2934-75b9-4c44-9ec6-c499d9a1f1e1")) node_id = 35 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89182025-03-07T23:30:22.835ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89192025-03-07T23:30:22.835ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 36 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89202025-03-07T23:30:22.839ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateSnatIp
89212025-03-07T23:30:22.839ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateSnatIp
89222025-03-07T23:30:22.840ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateSnatIp
89232025-03-07T23:30:22.845ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateSnatIp
89242025-03-07T23:30:22.845ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateSnatIp
89252025-03-07T23:30:22.846ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateSnatIp
89262025-03-07T23:30:22.881ZDEBGtest_unauthorized (SEC): saga log event new_state = N036 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89272025-03-07T23:30:22.881ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 36 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89282025-03-07T23:30:22.896ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89292025-03-07T23:30:22.896ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 37 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89302025-03-07T23:30:22.916ZDEBGtest_unauthorized (SEC): saga log event new_state = N037 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89312025-03-07T23:30:22.916ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 37 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89322025-03-07T23:30:22.951ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89332025-03-07T23:30:22.951ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 38 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89342025-03-07T23:30:22.956ZDEBGtest_unauthorized (SEC): saga log event new_state = N038 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89352025-03-07T23:30:22.957ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 38 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89362025-03-07T23:30:22.960ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89372025-03-07T23:30:22.971ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 39 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89382025-03-07T23:30:22.994ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89392025-03-07T23:30:22.994ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89402025-03-07T23:30:22.994ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89412025-03-07T23:30:22.998ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89422025-03-07T23:30:22.999ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89432025-03-07T23:30:22.999ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89442025-03-07T23:30:22.999ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89452025-03-07T23:30:22.999ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89462025-03-07T23:30:23.003ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89472025-03-07T23:30:23.019ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89482025-03-07T23:30:23.019ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89492025-03-07T23:30:23.019ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89502025-03-07T23:30:23.019ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89512025-03-07T23:30:23.023ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89522025-03-07T23:30:23.024ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89532025-03-07T23:30:23.024ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89542025-03-07T23:30:23.024ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89552025-03-07T23:30:23.024ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89562025-03-07T23:30:23.029ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89572025-03-07T23:30:23.033ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89582025-03-07T23:30:23.045ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89592025-03-07T23:30:23.045ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89602025-03-07T23:30:23.046ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89612025-03-07T23:30:23.074ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89622025-03-07T23:30:23.074ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89632025-03-07T23:30:23.074ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89642025-03-07T23:30:23.099ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89652025-03-07T23:30:23.099ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89662025-03-07T23:30:23.100ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89672025-03-07T23:30:23.101ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89682025-03-07T23:30:23.101ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89692025-03-07T23:30:23.102ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_node = CreateExternalIp0
89702025-03-07T23:30:23.108ZDEBGtest_unauthorized (SEC): saga log event new_state = N039 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89712025-03-07T23:30:23.108ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:23.045047Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:23.074130Z")}) node_id = 39 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89722025-03-07T23:30:23.111ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89732025-03-07T23:30:23.111ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 40 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89742025-03-07T23:30:23.115ZDEBGtest_unauthorized (SEC): saga log event new_state = N040 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89752025-03-07T23:30:23.115ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:23.045047Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:23.074130Z")}) node_id = 40 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89762025-03-07T23:30:23.118ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89772025-03-07T23:30:23.118ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 41 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89782025-03-07T23:30:23.128ZDEBGtest_unauthorized (SEC): saga log event new_state = N041 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89792025-03-07T23:30:23.128ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("ff494495-7930-470c-bdaf-7512da8c9174"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 41 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89802025-03-07T23:30:23.137ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89812025-03-07T23:30:23.137ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 42 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89822025-03-07T23:30:23.142ZDEBGtest_unauthorized (SEC): saga log event new_state = N042 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89832025-03-07T23:30:23.142ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 42 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89842025-03-07T23:30:23.145ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89852025-03-07T23:30:23.145ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 43 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89862025-03-07T23:30:23.148ZDEBGtest_unauthorized (SEC): saga log event new_state = N043 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89872025-03-07T23:30:23.148ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 43 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89882025-03-07T23:30:23.151ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89892025-03-07T23:30:23.151ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 44 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89902025-03-07T23:30:23.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
89912025-03-07T23:30:23.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
89922025-03-07T23:30:23.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
89932025-03-07T23:30:23.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
89942025-03-07T23:30:23.162ZDEBGtest_unauthorized (SEC): saga log event new_state = N044 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89952025-03-07T23:30:23.162ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 44 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
89962025-03-07T23:30:23.164ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
89972025-03-07T23:30:23.164ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
89982025-03-07T23:30:23.166ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
89992025-03-07T23:30:23.166ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 45 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90002025-03-07T23:30:23.167ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
90012025-03-07T23:30:23.168ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
90022025-03-07T23:30:23.168ZDEBGtest_unauthorized (SEC): saga log event new_state = N045 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90032025-03-07T23:30:23.168ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0c47bb39-14bd-40f1-a551-b71bdb743b74"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 45 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90042025-03-07T23:30:23.171ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90052025-03-07T23:30:23.171ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 46 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90062025-03-07T23:30:23.175ZDEBGtest_unauthorized (SEC): saga log event new_state = N046 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90072025-03-07T23:30:23.175ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 46 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90082025-03-07T23:30:23.181ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90092025-03-07T23:30:23.181ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 47 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90102025-03-07T23:30:23.184ZDEBGtest_unauthorized (SEC): saga log event new_state = N047 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90112025-03-07T23:30:23.184ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 47 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90122025-03-07T23:30:23.186ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90132025-03-07T23:30:23.186ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 48 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90142025-03-07T23:30:23.190ZDEBGtest_unauthorized (SEC): saga log event new_state = N048 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90152025-03-07T23:30:23.190ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 48 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90162025-03-07T23:30:23.208ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 2 reason = Timeout
90172025-03-07T23:30:23.208ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
90182025-03-07T23:30:23.208ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
90192025-03-07T23:30:23.210ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
90202025-03-07T23:30:23.210ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 2 reason = Timeout
90212025-03-07T23:30:23.210ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = bfd_manager iteration = 2 reason = Timeout
90222025-03-07T23:30:23.210ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
90232025-03-07T23:30:23.210ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
90242025-03-07T23:30:23.211ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
90252025-03-07T23:30:23.211ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 9 reason = Timeout
90262025-03-07T23:30:23.211ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 118.023\u{b5}s iteration = 9 status = {"error":"task disabled"}
90272025-03-07T23:30:23.212ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 2 reason = Timeout
90282025-03-07T23:30:23.212ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
90292025-03-07T23:30:23.212ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
90302025-03-07T23:30:23.212ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
90312025-03-07T23:30:23.212ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
90322025-03-07T23:30:23.213ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
90332025-03-07T23:30:23.214ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90342025-03-07T23:30:23.214ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 49 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90352025-03-07T23:30:23.215ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
90362025-03-07T23:30:23.218ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 8.447733ms iteration = 2 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
90372025-03-07T23:30:23.218ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
90382025-03-07T23:30:23.220ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
90392025-03-07T23:30:23.229ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
90402025-03-07T23:30:23.229ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
90412025-03-07T23:30:23.230ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
90422025-03-07T23:30:23.231ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
90432025-03-07T23:30:23.232ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 2 reason = Timeout
90442025-03-07T23:30:23.232ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
90452025-03-07T23:30:23.232ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
90462025-03-07T23:30:23.232ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
90472025-03-07T23:30:23.233ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
90482025-03-07T23:30:23.233ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
90492025-03-07T23:30:23.233ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 3 reason = Timeout
90502025-03-07T23:30:23.234ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
90512025-03-07T23:30:23.234ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
90522025-03-07T23:30:23.235ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
90532025-03-07T23:30:23.235ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 2 reason = Timeout
90542025-03-07T23:30:23.235ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
90552025-03-07T23:30:23.235ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
90562025-03-07T23:30:23.235ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
90572025-03-07T23:30:23.235ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
90582025-03-07T23:30:23.236ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
90592025-03-07T23:30:23.236ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 2 reason = Timeout
90602025-03-07T23:30:23.237ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
90612025-03-07T23:30:23.237ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 321.1\u{b5}s iteration = 2 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
90622025-03-07T23:30:23.237ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 5 reason = Timeout
90632025-03-07T23:30:23.237ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
90642025-03-07T23:30:23.237ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
90652025-03-07T23:30:23.237ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
90662025-03-07T23:30:23.237ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
90672025-03-07T23:30:23.237ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
90682025-03-07T23:30:23.239ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
90692025-03-07T23:30:23.239ZDEBGtest_unauthorized (SEC): saga log event new_state = N049 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
90702025-03-07T23:30:23.239ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("b894266f-d3de-46f2-a97c-56812e5ac154"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 49 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
90712025-03-07T23:30:23.240ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: ad 60 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .`..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:60958 req_id = 94499baf-76c2-4ca9-8724-d25eac7e5559
90722025-03-07T23:30:23.241ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 44384,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60958 req_id = 94499baf-76c2-4ca9-8724-d25eac7e5559
90732025-03-07T23:30:23.241ZDEBGtest_unauthorized (store): query key key = _dendrite._tcp
90742025-03-07T23:30:23.241ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
90752025-03-07T23:30:23.242ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:60958 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35050, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 94499baf-76c2-4ca9-8724-d25eac7e5559
90762025-03-07T23:30:23.242ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 85 13 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:54376 req_id = 1ff9c964-74fd-4bb2-b7c5-6e0c5e27b6b0
90772025-03-07T23:30:23.242ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 34067,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54376 req_id = 1ff9c964-74fd-4bb2-b7c5-6e0c5e27b6b0
90782025-03-07T23:30:23.243ZDEBGtest_unauthorized (store): query key key = _dendrite._tcp
90792025-03-07T23:30:23.243ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
90802025-03-07T23:30:23.243ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:54376 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35050, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 1ff9c964-74fd-4bb2-b7c5-6e0c5e27b6b0
90812025-03-07T23:30:23.244ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
90822025-03-07T23:30:23.244ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
90832025-03-07T23:30:23.245ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
90842025-03-07T23:30:23.247ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
90852025-03-07T23:30:23.267ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
90862025-03-07T23:30:23.267ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
90872025-03-07T23:30:23.268ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
90882025-03-07T23:30:23.268ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
90892025-03-07T23:30:23.294ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
90902025-03-07T23:30:23.294ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
90912025-03-07T23:30:23.295ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
90922025-03-07T23:30:23.295ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
90932025-03-07T23:30:23.310ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
90942025-03-07T23:30:23.321ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
90952025-03-07T23:30:23.321ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
90962025-03-07T23:30:23.322ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
90972025-03-07T23:30:23.323ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
90982025-03-07T23:30:23.331ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
90992025-03-07T23:30:23.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
91002025-03-07T23:30:23.331ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
91012025-03-07T23:30:23.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
91022025-03-07T23:30:23.331ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
91032025-03-07T23:30:23.331ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
91042025-03-07T23:30:23.349ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
91052025-03-07T23:30:23.349ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 50 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
91062025-03-07T23:30:23.350ZDEBGtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35050, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3919, tv_nsec: 897618634 } })
91072025-03-07T23:30:23.350ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
91082025-03-07T23:30:23.351ZDEBGtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35050, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3919, tv_nsec: 898017516 } })
91092025-03-07T23:30:23.351ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
91102025-03-07T23:30:23.351ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
91112025-03-07T23:30:23.352ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 35 a2 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e 5...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:57301 req_id = 07f34042-b629-497c-b086-2959de6ecc3e
91122025-03-07T23:30:23.353ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 13730,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57301 req_id = 07f34042-b629-497c-b086-2959de6ecc3e
91132025-03-07T23:30:23.353ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
91142025-03-07T23:30:23.353ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:57301 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 07f34042-b629-497c-b086-2959de6ecc3e
91152025-03-07T23:30:23.354ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 1d 14 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:57606 req_id = 161ef29a-f107-4e66-9333-f5157f6273fa
91162025-03-07T23:30:23.354ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 7444,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57606 req_id = 161ef29a-f107-4e66-9333-f5157f6273fa
91172025-03-07T23:30:23.354ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
91182025-03-07T23:30:23.354ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:57606 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 161ef29a-f107-4e66-9333-f5157f6273fa
91192025-03-07T23:30:23.354ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
91202025-03-07T23:30:23.359ZINFOtest_unauthorized (BackgroundTasks): Determining switch slots managed by switch zones background_task = nat_v4_garbage_collector
91212025-03-07T23:30:23.458ZINFOtest_unauthorized (BackgroundTasks): determining switch slot managed by dendrite zone background_task = nat_v4_garbage_collector zone_address = ::1
91222025-03-07T23:30:23.458ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
91232025-03-07T23:30:23.458ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
91242025-03-07T23:30:23.459ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
91252025-03-07T23:30:23.459ZINFOtest_unauthorized (BackgroundTasks): Determining switch slots managed by switch zones background_task = bfd_manager
91262025-03-07T23:30:23.620ZINFOtest_unauthorized (BackgroundTasks): determining switch slot managed by dendrite zone background_task = bfd_manager zone_address = ::1
91272025-03-07T23:30:23.620ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
91282025-03-07T23:30:23.628ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
91292025-03-07T23:30:23.628ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
91302025-03-07T23:30:23.726ZTRACtest_unauthorized (BackgroundTasks): checking on VMM background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
91312025-03-07T23:30:23.726ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher body = None method = GET uri = http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
91322025-03-07T23:30:23.726ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
91332025-03-07T23:30:23.727ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
91342025-03-07T23:30:23.727ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
91352025-03-07T23:30:23.727ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
91362025-03-07T23:30:23.728ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
91372025-03-07T23:30:23.729ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
91382025-03-07T23:30:23.736ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
91392025-03-07T23:30:23.736ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
91402025-03-07T23:30:23.737ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
91412025-03-07T23:30:23.737ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
91422025-03-07T23:30:23.741ZDEBGtest_unauthorized (SEC): saga log event new_state = N050 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
91432025-03-07T23:30:23.741ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 50 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
91442025-03-07T23:30:23.742ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
91452025-03-07T23:30:23.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
91462025-03-07T23:30:23.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
91472025-03-07T23:30:23.750ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
91482025-03-07T23:30:23.750ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
91492025-03-07T23:30:23.751ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
91502025-03-07T23:30:23.752ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
91512025-03-07T23:30:23.876ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
91522025-03-07T23:30:23.876ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
91532025-03-07T23:30:23.884ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:50100 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
91542025-03-07T23:30:23.885ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:38314 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
91552025-03-07T23:30:23.885ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
91562025-03-07T23:30:23.887ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91572025-03-07T23:30:23.887ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
91582025-03-07T23:30:23.887ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 51 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
91592025-03-07T23:30:23.887ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: fc 1d 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:55287 req_id = ffd18fd0-61a7-449b-8eb0-47d0d29cb41e
91602025-03-07T23:30:23.887ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 64541,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55287 req_id = ffd18fd0-61a7-449b-8eb0-47d0d29cb41e
91612025-03-07T23:30:23.887ZDEBGtest_unauthorized (store): query key key = _dendrite._tcp
91622025-03-07T23:30:23.888ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
91632025-03-07T23:30:23.888ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:55287 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35050, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = ffd18fd0-61a7-449b-8eb0-47d0d29cb41e
91642025-03-07T23:30:23.888ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91652025-03-07T23:30:23.892ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91662025-03-07T23:30:23.893ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
91672025-03-07T23:30:23.898ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
91682025-03-07T23:30:23.898ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
91692025-03-07T23:30:23.898ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
91702025-03-07T23:30:23.898ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
91712025-03-07T23:30:23.903ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b6462947-2279-435a-889c-0871a6306867 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91722025-03-07T23:30:23.904ZDEBGtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 35050, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3920, tv_nsec: 451013170 } })
91732025-03-07T23:30:23.904ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
91742025-03-07T23:30:23.904ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:50100 req_id = e9f31caf-71da-4ab5-b858-9c6ce5153a49 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
91752025-03-07T23:30:23.904ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:38314 req_id = 6c0901cc-ff2f-4d65-8040-db4334ab1e1f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
91762025-03-07T23:30:23.904ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b6462947-2279-435a-889c-0871a6306867 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91772025-03-07T23:30:23.904ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b6462947-2279-435a-889c-0871a6306867 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91782025-03-07T23:30:23.905ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b6462947-2279-435a-889c-0871a6306867 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91792025-03-07T23:30:23.907ZINFOtest_unauthorized (dropshot): request completed latency_us = 2556 local_addr = [::1]:57532 method = GET remote_addr = [::1]:50100 req_id = e9f31caf-71da-4ab5-b858-9c6ce5153a49 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
91802025-03-07T23:30:23.907ZINFOtest_unauthorized (dropshot): request completed latency_us = 2501 local_addr = [::1]:57532 method = GET remote_addr = [::1]:38314 req_id = 6c0901cc-ff2f-4d65-8040-db4334ab1e1f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
91812025-03-07T23:30:23.909ZDEBGtest_unauthorized (SEC): saga log event new_state = N051 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
91822025-03-07T23:30:23.909ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 51 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
91832025-03-07T23:30:24.098ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:57532/v2p
91842025-03-07T23:30:24.099ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 196183 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b6462947-2279-435a-889c-0871a6306867 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
91852025-03-07T23:30:24.102ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
91862025-03-07T23:30:24.102ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 52 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
91872025-03-07T23:30:24.103ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:36599 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
91882025-03-07T23:30:24.103ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b6462947-2279-435a-889c-0871a6306867", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
91892025-03-07T23:30:24.106ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
91902025-03-07T23:30:24.106ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91912025-03-07T23:30:24.107ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91922025-03-07T23:30:24.108ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91932025-03-07T23:30:24.108ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
91942025-03-07T23:30:24.108ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher result = Ok(Response { url: "http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "e9f31caf-71da-4ab5-b858-9c6ce5153a49", "content-length": "131", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
91952025-03-07T23:30:24.108ZDEBGtest_unauthorized (BackgroundTasks): updating instance state background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }, migration_in: None, migration_out: None } vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
91962025-03-07T23:30:24.108ZINFOtest_unauthorized (BackgroundTasks): received new VMM runtime state from sled agent background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331 vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }
91972025-03-07T23:30:24.108ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc resource = Database sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
91982025-03-07T23:30:24.108ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc roles = RoleSet { roles: {} } sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
91992025-03-07T23:30:24.111ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc resource = Database result = Ok(()) sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
92002025-03-07T23:30:24.111ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "6c0901cc-ff2f-4d65-8040-db4334ab1e1f", "content-length": "210", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
92012025-03-07T23:30:24.111ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92022025-03-07T23:30:24.111ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92032025-03-07T23:30:24.112ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92042025-03-07T23:30:24.116ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e4f7ffec-943a-4ec6-8916-1fd67e9caf69 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
92052025-03-07T23:30:24.117ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:36599 req_id = 8be82cea-dd34-44ab-ac46-541d0355c4fe sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
92062025-03-07T23:30:24.117ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 45 84 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e E...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:60236 req_id = e7c94e99-a0fa-4769-b8e5-a29f2444d3f2
92072025-03-07T23:30:24.120ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 17796,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60236 req_id = e7c94e99-a0fa-4769-b8e5-a29f2444d3f2
92082025-03-07T23:30:24.120ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
92092025-03-07T23:30:24.121ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:60236 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = e7c94e99-a0fa-4769-b8e5-a29f2444d3f2
92102025-03-07T23:30:24.121ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e4f7ffec-943a-4ec6-8916-1fd67e9caf69 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
92112025-03-07T23:30:24.121ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e4f7ffec-943a-4ec6-8916-1fd67e9caf69 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
92122025-03-07T23:30:24.122ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e4f7ffec-943a-4ec6-8916-1fd67e9caf69 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
92132025-03-07T23:30:24.123ZINFOtest_unauthorized (dropshot): request completed latency_us = 6176 local_addr = [::1]:57532 method = GET remote_addr = [::1]:36599 req_id = 8be82cea-dd34-44ab-ac46-541d0355c4fe response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
92142025-03-07T23:30:24.123ZDEBGtest_unauthorized (SEC): saga log event new_state = N052 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92152025-03-07T23:30:24.123ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 52 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92162025-03-07T23:30:24.129ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 12961 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e4f7ffec-943a-4ec6-8916-1fd67e9caf69 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
92172025-03-07T23:30:24.130ZINFOtest_unauthorized (BackgroundTasks): Determining switch slots managed by switch zones background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc
92182025-03-07T23:30:24.255ZINFOtest_unauthorized (BackgroundTasks): determining switch slot managed by dendrite zone background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc zone_address = ::1
92192025-03-07T23:30:24.256ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
92202025-03-07T23:30:24.256ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
92212025-03-07T23:30:24.256ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
92222025-03-07T23:30:24.260ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e4f7ffec-943a-4ec6-8916-1fd67e9caf69", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
92232025-03-07T23:30:24.261ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92242025-03-07T23:30:24.261ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
92252025-03-07T23:30:24.261ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
92262025-03-07T23:30:24.261ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:57532/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "8be82cea-dd34-44ab-ac46-541d0355c4fe", "content-length": "101", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
92272025-03-07T23:30:24.261ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(137359) }} sled = sim-b6d65341
92282025-03-07T23:30:24.261ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
92292025-03-07T23:30:24.261ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
92302025-03-07T23:30:24.263ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 1.029595567s iteration = 3 status = {}
92312025-03-07T23:30:24.264ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92322025-03-07T23:30:24.264ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 53 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92332025-03-07T23:30:24.270ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b: {10.0.0.1: {faa36720-8d06-4c5a-8e59-3859e80311a0}, 10.0.0.0: {faa36720-8d06-4c5a-8e59-3859e80311a0}}} background_task = vpc_route_manager sled = sim-b6d65341
92342025-03-07T23:30:24.270ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
92352025-03-07T23:30:24.271ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 1 total_failed = 0 total_incomplete = 0 total_instances = 1 update_sagas_queued = 0
92362025-03-07T23:30:24.277ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 1.04256305s iteration = 2 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{"starting":1},"pruned_instances":0,"total_instances":1,"update_sagas_queued":0}
92372025-03-07T23:30:24.280ZDEBGtest_unauthorized (SEC): saga log event new_state = N053 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92382025-03-07T23:30:24.280ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("d9bed123-c9e3-4922-a338-a3991f5f1224"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 53 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92392025-03-07T23:30:24.281ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
92402025-03-07T23:30:24.281ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
92412025-03-07T23:30:24.283ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
92422025-03-07T23:30:24.285ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:38314 req_id = 92caeaed-546b-45ee-9330-6b2d70039e4c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
92432025-03-07T23:30:24.285ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
92442025-03-07T23:30:24.285ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
92452025-03-07T23:30:24.286ZINFOtest_unauthorized (dropshot): request completed latency_us = 740 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:38314 req_id = 92caeaed-546b-45ee-9330-6b2d70039e4c response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
92462025-03-07T23:30:24.286ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
92472025-03-07T23:30:24.288ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
92482025-03-07T23:30:24.291ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92492025-03-07T23:30:24.291ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 54 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92502025-03-07T23:30:24.293ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
92512025-03-07T23:30:24.293ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
92522025-03-07T23:30:24.293ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
92532025-03-07T23:30:24.293ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
92542025-03-07T23:30:24.294ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
92552025-03-07T23:30:24.302ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "92caeaed-546b-45ee-9330-6b2d70039e4c", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
92562025-03-07T23:30:24.302ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92572025-03-07T23:30:24.302ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92582025-03-07T23:30:24.303ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92592025-03-07T23:30:24.303ZDEBGtest_unauthorized (SEC): saga log event new_state = N054 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92602025-03-07T23:30:24.303ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 54 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92612025-03-07T23:30:24.304ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
92622025-03-07T23:30:24.304ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
92632025-03-07T23:30:24.305ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
92642025-03-07T23:30:24.315ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
92652025-03-07T23:30:24.316ZERROtest_unauthorized (BackgroundTasks): ipv6 addresses for service zone nat not implemented background_task = service_zone_nat_tracker
92662025-03-07T23:30:24.316ZERROtest_unauthorized (BackgroundTasks): generated config for fewer than the minimum allowed number of dns zones background_task = service_zone_nat_tracker
92672025-03-07T23:30:24.316ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 1.104632737s iteration = 2 status = {"error":"generated config for fewer than the minimum allowed number of dns zones"}
92682025-03-07T23:30:24.317ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92692025-03-07T23:30:24.317ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92702025-03-07T23:30:24.318ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92712025-03-07T23:30:24.322ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92722025-03-07T23:30:24.322ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 55 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92732025-03-07T23:30:24.323ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
92742025-03-07T23:30:24.323ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
92752025-03-07T23:30:24.331ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92762025-03-07T23:30:24.331ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92772025-03-07T23:30:24.331ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92782025-03-07T23:30:24.333ZDEBGtest_unauthorized (SEC): saga log event new_state = N055 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92792025-03-07T23:30:24.333ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 55 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92802025-03-07T23:30:24.335ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92812025-03-07T23:30:24.336ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92822025-03-07T23:30:24.337ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92832025-03-07T23:30:24.352ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92842025-03-07T23:30:24.352ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 56 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92852025-03-07T23:30:24.352ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92862025-03-07T23:30:24.352ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92872025-03-07T23:30:24.353ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92882025-03-07T23:30:24.371ZDEBGtest_unauthorized (SEC): saga log event new_state = N056 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92892025-03-07T23:30:24.371ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 56 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92902025-03-07T23:30:24.372ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92912025-03-07T23:30:24.372ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92922025-03-07T23:30:24.373ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92932025-03-07T23:30:24.377ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
92942025-03-07T23:30:24.377ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
92952025-03-07T23:30:24.378ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
92962025-03-07T23:30:24.379ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
92972025-03-07T23:30:24.379ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 57 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
92982025-03-07T23:30:24.390ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) }
92992025-03-07T23:30:24.390ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
93002025-03-07T23:30:24.390ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93012025-03-07T23:30:24.390ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93022025-03-07T23:30:24.391ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93032025-03-07T23:30:24.392ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
93042025-03-07T23:30:24.393ZDEBGtest_unauthorized (SEC): saga log event new_state = N057 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93052025-03-07T23:30:24.393ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("59b6dc6e-36e0-417f-8937-dd267e948cae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 57 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93062025-03-07T23:30:24.395ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
93072025-03-07T23:30:24.395ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93082025-03-07T23:30:24.395ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93092025-03-07T23:30:24.396ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93102025-03-07T23:30:24.401ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93112025-03-07T23:30:24.405ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 58 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93122025-03-07T23:30:24.405ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
93132025-03-07T23:30:24.407ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93142025-03-07T23:30:24.408ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93152025-03-07T23:30:24.409ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93162025-03-07T23:30:24.414ZDEBGtest_unauthorized (SEC): saga log event new_state = N058 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93172025-03-07T23:30:24.414ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 58 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93182025-03-07T23:30:24.415ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
93192025-03-07T23:30:24.447ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(())
93202025-03-07T23:30:24.447ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user background_task = vpc_route_manager
93212025-03-07T23:30:24.447ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) }
93222025-03-07T23:30:24.447ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
93232025-03-07T23:30:24.447ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93242025-03-07T23:30:24.447ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93252025-03-07T23:30:24.448ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93262025-03-07T23:30:24.451ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
93272025-03-07T23:30:24.452ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93282025-03-07T23:30:24.452ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93292025-03-07T23:30:24.453ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93302025-03-07T23:30:24.458ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93312025-03-07T23:30:24.458ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 59 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93322025-03-07T23:30:24.460ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
93332025-03-07T23:30:24.460ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93342025-03-07T23:30:24.460ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93352025-03-07T23:30:24.461ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93362025-03-07T23:30:24.463ZDEBGtest_unauthorized (SEC): saga log event new_state = N059 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93372025-03-07T23:30:24.463ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 59 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93382025-03-07T23:30:24.463ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
93392025-03-07T23:30:24.479ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 558b943f-615e-41e8-99e8-49769e9604aa, lookup_type: ById(558b943f-615e-41e8-99e8-49769e9604aa) } result = Ok(())
93402025-03-07T23:30:24.479ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93412025-03-07T23:30:24.479ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93422025-03-07T23:30:24.479ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93432025-03-07T23:30:24.484ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93442025-03-07T23:30:24.484ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 60 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93452025-03-07T23:30:24.485ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93462025-03-07T23:30:24.485ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93472025-03-07T23:30:24.485ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93482025-03-07T23:30:24.488ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93492025-03-07T23:30:24.488ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93502025-03-07T23:30:24.489ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93512025-03-07T23:30:24.490ZDEBGtest_unauthorized (SEC): saga log event new_state = N060 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93522025-03-07T23:30:24.490ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 60 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93532025-03-07T23:30:24.492ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93542025-03-07T23:30:24.492ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93552025-03-07T23:30:24.492ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93562025-03-07T23:30:24.494ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93572025-03-07T23:30:24.494ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 61 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93582025-03-07T23:30:24.497ZDEBGtest_unauthorized (SEC): saga log event new_state = N061 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93592025-03-07T23:30:24.497ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("8eff62cd-a940-4081-8049-77dbc80d2d05"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 61 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93602025-03-07T23:30:24.497ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93612025-03-07T23:30:24.497ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93622025-03-07T23:30:24.498ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93632025-03-07T23:30:24.502ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ById(81d663ad-afb5-4444-9e4c-156a9f15d2a3) }
93642025-03-07T23:30:24.502ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
93652025-03-07T23:30:24.502ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93662025-03-07T23:30:24.502ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93672025-03-07T23:30:24.503ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93682025-03-07T23:30:24.503ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93692025-03-07T23:30:24.503ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 62 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93702025-03-07T23:30:24.507ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
93712025-03-07T23:30:24.507ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93722025-03-07T23:30:24.507ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93732025-03-07T23:30:24.507ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93742025-03-07T23:30:24.510ZDEBGtest_unauthorized (SEC): saga log event new_state = N062 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93752025-03-07T23:30:24.510ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 62 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93762025-03-07T23:30:24.510ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
93772025-03-07T23:30:24.510ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93782025-03-07T23:30:24.510ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93792025-03-07T23:30:24.510ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93802025-03-07T23:30:24.513ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93812025-03-07T23:30:24.513ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 63 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93822025-03-07T23:30:24.513ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
93832025-03-07T23:30:24.524ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ById(81d663ad-afb5-4444-9e4c-156a9f15d2a3) } result = Ok(())
93842025-03-07T23:30:24.524ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
93852025-03-07T23:30:24.524ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93862025-03-07T23:30:24.524ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93872025-03-07T23:30:24.525ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93882025-03-07T23:30:24.528ZDEBGtest_unauthorized (SEC): saga log event new_state = N063 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93892025-03-07T23:30:24.528ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 63 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93902025-03-07T23:30:24.528ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93912025-03-07T23:30:24.528ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93922025-03-07T23:30:24.529ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93932025-03-07T23:30:24.533ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
93942025-03-07T23:30:24.533ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 64 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
93952025-03-07T23:30:24.534ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93962025-03-07T23:30:24.534ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
93972025-03-07T23:30:24.534ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
93982025-03-07T23:30:24.536ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
93992025-03-07T23:30:24.536ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94002025-03-07T23:30:24.537ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94012025-03-07T23:30:24.537ZDEBGtest_unauthorized (SEC): saga log event new_state = N064 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94022025-03-07T23:30:24.537ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 64 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94032025-03-07T23:30:24.539ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") }
94042025-03-07T23:30:24.539ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
94052025-03-07T23:30:24.539ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94062025-03-07T23:30:24.539ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94072025-03-07T23:30:24.539ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94082025-03-07T23:30:24.540ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94092025-03-07T23:30:24.540ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 65 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94102025-03-07T23:30:24.542ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
94112025-03-07T23:30:24.542ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94122025-03-07T23:30:24.542ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94132025-03-07T23:30:24.542ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94142025-03-07T23:30:24.544ZDEBGtest_unauthorized (SEC): saga log event new_state = N065 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94152025-03-07T23:30:24.545ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("01bd76ea-059a-4311-9e4c-3d6529f0aae8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 65 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94162025-03-07T23:30:24.545ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
94172025-03-07T23:30:24.545ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94182025-03-07T23:30:24.545ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94192025-03-07T23:30:24.546ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94202025-03-07T23:30:24.550ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94212025-03-07T23:30:24.550ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 66 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94222025-03-07T23:30:24.553ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
94232025-03-07T23:30:24.564ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: 81d663ad-afb5-4444-9e4c-156a9f15d2a3, lookup_type: ByName("default") } result = Ok(())
94242025-03-07T23:30:24.564ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
94252025-03-07T23:30:24.564ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94262025-03-07T23:30:24.565ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94272025-03-07T23:30:24.565ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94282025-03-07T23:30:24.566ZDEBGtest_unauthorized (SEC): saga log event new_state = N066 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94292025-03-07T23:30:24.566ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 66 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94302025-03-07T23:30:24.566ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
94312025-03-07T23:30:24.566ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
94322025-03-07T23:30:24.569ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94332025-03-07T23:30:24.569ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94342025-03-07T23:30:24.570ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94352025-03-07T23:30:24.570ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
94362025-03-07T23:30:24.571ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
94372025-03-07T23:30:24.571ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
94382025-03-07T23:30:24.571ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
94392025-03-07T23:30:24.572ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94402025-03-07T23:30:24.572ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 67 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94412025-03-07T23:30:24.572ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94422025-03-07T23:30:24.572ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94432025-03-07T23:30:24.573ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94442025-03-07T23:30:24.576ZDEBGtest_unauthorized (SEC): saga log event new_state = N067 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94452025-03-07T23:30:24.576ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 67 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94462025-03-07T23:30:24.577ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94472025-03-07T23:30:24.577ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94482025-03-07T23:30:24.577ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94492025-03-07T23:30:24.580ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94502025-03-07T23:30:24.580ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 68 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94512025-03-07T23:30:24.581ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: faa36720-8d06-4c5a-8e59-3859e80311a0, lookup_type: ByName("default") }
94522025-03-07T23:30:24.581ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project
94532025-03-07T23:30:24.581ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94542025-03-07T23:30:24.581ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94552025-03-07T23:30:24.581ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94562025-03-07T23:30:24.584ZDEBGtest_unauthorized (SEC): saga log event new_state = N068 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94572025-03-07T23:30:24.584ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 68 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94582025-03-07T23:30:24.584ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
94592025-03-07T23:30:24.584ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94602025-03-07T23:30:24.584ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94612025-03-07T23:30:24.585ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94622025-03-07T23:30:24.587ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94632025-03-07T23:30:24.587ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 69 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94642025-03-07T23:30:24.587ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
94652025-03-07T23:30:24.587ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
94662025-03-07T23:30:24.587ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
94672025-03-07T23:30:24.587ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
94682025-03-07T23:30:24.589ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
94692025-03-07T23:30:24.599ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 182052df-e0ed-456b-aca9-6adc62b39334, lookup_type: ById(182052df-e0ed-456b-aca9-6adc62b39334) }, key: faa36720-8d06-4c5a-8e59-3859e80311a0, lookup_type: ByName("default") } result = Ok(())
94702025-03-07T23:30:24.599ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user background_task = vpc_route_manager
94712025-03-07T23:30:24.599ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/vpc-routes
94722025-03-07T23:30:24.599ZDEBGtest_unauthorized (SEC): saga log event new_state = N069 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94732025-03-07T23:30:24.599ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("7131f213-48f5-4f00-9a21-aec722ba1e60"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}) node_id = 69 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94742025-03-07T23:30:24.601ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:38314 req_id = 5018b892-c0b0-4925-8f12-7e88bdabd3cf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
94752025-03-07T23:30:24.603ZINFOtest_unauthorized (dropshot): request completed latency_us = 2142 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:38314 req_id = 5018b892-c0b0-4925-8f12-7e88bdabd3cf response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
94762025-03-07T23:30:24.603ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94772025-03-07T23:30:24.603ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 70 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94782025-03-07T23:30:24.605ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 204, headers: {"x-request-id": "5018b892-c0b0-4925-8f12-7e88bdabd3cf", "date": "Fri, 07 Mar 2025 23:30:23 GMT"} })
94792025-03-07T23:30:24.608ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 1.371460128s iteration = 5 status = {}
94802025-03-07T23:30:24.609ZDEBGtest_unauthorized (SEC): saga log event new_state = N070 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94812025-03-07T23:30:24.609ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 70 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94822025-03-07T23:30:24.613ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94832025-03-07T23:30:24.613ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 71 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94842025-03-07T23:30:24.617ZDEBGtest_unauthorized (SEC): saga log event new_state = N071 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94852025-03-07T23:30:24.617ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 71 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94862025-03-07T23:30:24.620ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94872025-03-07T23:30:24.620ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 72 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94882025-03-07T23:30:24.622ZDEBGtest_unauthorized (SEC): saga log event new_state = N072 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94892025-03-07T23:30:24.623ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 72 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94902025-03-07T23:30:24.625ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94912025-03-07T23:30:24.625ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 73 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94922025-03-07T23:30:24.627ZDEBGtest_unauthorized (SEC): saga log event new_state = N073 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94932025-03-07T23:30:24.627ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("90366dc7-fd43-4eff-b137-cf89a45abf6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}) node_id = 73 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94942025-03-07T23:30:24.631ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94952025-03-07T23:30:24.631ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 74 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94962025-03-07T23:30:24.633ZDEBGtest_unauthorized (SEC): saga log event new_state = N074 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94972025-03-07T23:30:24.633ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 74 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
94982025-03-07T23:30:24.636ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
94992025-03-07T23:30:24.636ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 75 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95002025-03-07T23:30:24.639ZDEBGtest_unauthorized (SEC): saga log event new_state = N075 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95012025-03-07T23:30:24.640ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 75 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95022025-03-07T23:30:24.644ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95032025-03-07T23:30:24.644ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 76 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95042025-03-07T23:30:24.650ZDEBGtest_unauthorized (SEC): saga log event new_state = N076 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95052025-03-07T23:30:24.651ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 76 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95062025-03-07T23:30:24.660ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95072025-03-07T23:30:24.660ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 77 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95082025-03-07T23:30:24.665ZDEBGtest_unauthorized (SEC): saga log event new_state = N077 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95092025-03-07T23:30:24.665ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9029ff68-2370-4f3c-9ba4-10ce6a050438"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}) node_id = 77 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95102025-03-07T23:30:24.669ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95112025-03-07T23:30:24.669ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 78 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95122025-03-07T23:30:24.672ZDEBGtest_unauthorized (SEC): saga log event new_state = N078 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95132025-03-07T23:30:24.673ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 78 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95142025-03-07T23:30:24.676ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95152025-03-07T23:30:24.676ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 79 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95162025-03-07T23:30:24.681ZDEBGtest_unauthorized (SEC): saga log event new_state = N079 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95172025-03-07T23:30:24.681ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 79 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95182025-03-07T23:30:24.685ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95192025-03-07T23:30:24.685ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 80 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95202025-03-07T23:30:24.689ZDEBGtest_unauthorized (SEC): saga log event new_state = N080 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95212025-03-07T23:30:24.689ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 80 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95222025-03-07T23:30:24.692ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95232025-03-07T23:30:24.692ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 81 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95242025-03-07T23:30:24.695ZDEBGtest_unauthorized (SEC): saga log event new_state = N081 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95252025-03-07T23:30:24.696ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("33751a32-22ef-400b-84e0-0352ea0d0ddf"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}) node_id = 81 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95262025-03-07T23:30:24.700ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95272025-03-07T23:30:24.700ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 82 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95282025-03-07T23:30:24.707ZDEBGtest_unauthorized (SEC): saga log event new_state = N082 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95292025-03-07T23:30:24.707ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 82 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95302025-03-07T23:30:24.711ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95312025-03-07T23:30:24.711ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 83 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95322025-03-07T23:30:24.715ZDEBGtest_unauthorized (SEC): saga log event new_state = N083 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95332025-03-07T23:30:24.715ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 83 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95342025-03-07T23:30:24.722ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95352025-03-07T23:30:24.722ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 84 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95362025-03-07T23:30:24.729ZDEBGtest_unauthorized (SEC): saga log event new_state = N084 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95372025-03-07T23:30:24.729ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 84 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95382025-03-07T23:30:24.737ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95392025-03-07T23:30:24.737ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 85 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95402025-03-07T23:30:24.745ZDEBGtest_unauthorized (SEC): saga log event new_state = N085 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95412025-03-07T23:30:24.745ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("02dab528-c62c-48bc-a617-519b6054fa98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}) node_id = 85 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95422025-03-07T23:30:24.757ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95432025-03-07T23:30:24.757ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 86 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95442025-03-07T23:30:24.766ZDEBGtest_unauthorized (SEC): saga log event new_state = N086 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95452025-03-07T23:30:24.766ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 86 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95462025-03-07T23:30:24.772ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95472025-03-07T23:30:24.772ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 87 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95482025-03-07T23:30:24.781ZDEBGtest_unauthorized (SEC): saga log event new_state = N087 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95492025-03-07T23:30:24.781ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 87 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95502025-03-07T23:30:24.784ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95512025-03-07T23:30:24.784ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 88 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95522025-03-07T23:30:24.787ZDEBGtest_unauthorized (SEC): saga log event new_state = N088 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95532025-03-07T23:30:24.787ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 88 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95542025-03-07T23:30:24.790ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95552025-03-07T23:30:24.790ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 89 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95562025-03-07T23:30:24.792ZDEBGtest_unauthorized (SEC): saga log event new_state = N089 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95572025-03-07T23:30:24.792ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("57d38196-7c3e-4d68-8184-230713dc4950"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}) node_id = 89 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95582025-03-07T23:30:24.796ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95592025-03-07T23:30:24.799ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 90 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95602025-03-07T23:30:24.800ZDEBGtest_unauthorized (SEC): saga log event new_state = N090 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95612025-03-07T23:30:24.800ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 90 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95622025-03-07T23:30:24.802ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95632025-03-07T23:30:24.802ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 91 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95642025-03-07T23:30:24.808ZDEBGtest_unauthorized (SEC): saga log event new_state = N091 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95652025-03-07T23:30:24.808ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 91 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95662025-03-07T23:30:24.813ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95672025-03-07T23:30:24.820ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 92 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95682025-03-07T23:30:24.836ZDEBGtest_unauthorized (SEC): saga log event new_state = N092 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95692025-03-07T23:30:24.843ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 92 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95702025-03-07T23:30:24.849ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95712025-03-07T23:30:24.849ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 93 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95722025-03-07T23:30:24.852ZDEBGtest_unauthorized (SEC): saga log event new_state = N093 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95732025-03-07T23:30:24.852ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("2f3c7351-b25e-4def-9517-e120edc77782"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}) node_id = 93 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95742025-03-07T23:30:24.855ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95752025-03-07T23:30:24.855ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 94 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95762025-03-07T23:30:24.867ZDEBGtest_unauthorized (SEC): saga log event new_state = N094 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95772025-03-07T23:30:24.867ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 94 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95782025-03-07T23:30:24.876ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95792025-03-07T23:30:24.877ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 95 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95802025-03-07T23:30:24.885ZDEBGtest_unauthorized (SEC): saga log event new_state = N095 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95812025-03-07T23:30:24.885ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 95 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95822025-03-07T23:30:24.889ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95832025-03-07T23:30:24.889ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 96 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95842025-03-07T23:30:24.895ZDEBGtest_unauthorized (SEC): saga log event new_state = N096 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95852025-03-07T23:30:24.897ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 96 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95862025-03-07T23:30:24.902ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95872025-03-07T23:30:24.902ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 97 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95882025-03-07T23:30:24.906ZDEBGtest_unauthorized (SEC): saga log event new_state = N097 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95892025-03-07T23:30:24.906ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6ef0e1d7-6318-4ea6-9e38-e401c5037de1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}) node_id = 97 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95902025-03-07T23:30:24.911ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95912025-03-07T23:30:24.911ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 98 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95922025-03-07T23:30:24.914ZDEBGtest_unauthorized (SEC): saga log event new_state = N098 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95932025-03-07T23:30:24.914ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 98 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95942025-03-07T23:30:24.920ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95952025-03-07T23:30:24.920ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 99 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95962025-03-07T23:30:24.926ZDEBGtest_unauthorized (SEC): saga log event new_state = N099 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95972025-03-07T23:30:24.926ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 99 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
95982025-03-07T23:30:24.931ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
95992025-03-07T23:30:24.932ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 100 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96002025-03-07T23:30:24.935ZDEBGtest_unauthorized (SEC): saga log event new_state = N100 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96012025-03-07T23:30:24.935ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 100 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96022025-03-07T23:30:24.939ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96032025-03-07T23:30:24.939ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 101 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96042025-03-07T23:30:24.943ZDEBGtest_unauthorized (SEC): saga log event new_state = N101 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96052025-03-07T23:30:24.943ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6a9a16b4-6387-4505-acd4-02dc77786bdd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}) node_id = 101 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96062025-03-07T23:30:24.948ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96072025-03-07T23:30:24.948ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 102 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96082025-03-07T23:30:24.951ZDEBGtest_unauthorized (SEC): saga log event new_state = N102 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96092025-03-07T23:30:24.951ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 102 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96102025-03-07T23:30:24.959ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96112025-03-07T23:30:24.959ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 103 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96122025-03-07T23:30:24.963ZDEBGtest_unauthorized (SEC): saga log event new_state = N103 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96132025-03-07T23:30:24.963ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 103 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96142025-03-07T23:30:24.966ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96152025-03-07T23:30:24.966ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 104 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96162025-03-07T23:30:24.969ZDEBGtest_unauthorized (SEC): saga log event new_state = N104 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96172025-03-07T23:30:24.969ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 104 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96182025-03-07T23:30:24.972ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96192025-03-07T23:30:24.972ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 105 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96202025-03-07T23:30:24.976ZDEBGtest_unauthorized (SEC): saga log event new_state = N105 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96212025-03-07T23:30:24.976ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("85779176-eb5f-4698-b5ca-fef6a6a174ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}) node_id = 105 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96222025-03-07T23:30:24.979ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96232025-03-07T23:30:24.979ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 106 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96242025-03-07T23:30:24.981ZDEBGtest_unauthorized (SEC): saga log event new_state = N106 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96252025-03-07T23:30:24.981ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 106 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96262025-03-07T23:30:24.984ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96272025-03-07T23:30:24.984ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 107 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96282025-03-07T23:30:24.987ZDEBGtest_unauthorized (SEC): saga log event new_state = N107 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96292025-03-07T23:30:24.987ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 107 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96302025-03-07T23:30:24.991ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96312025-03-07T23:30:24.991ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 108 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96322025-03-07T23:30:24.993ZDEBGtest_unauthorized (SEC): saga log event new_state = N108 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96332025-03-07T23:30:24.993ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 108 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96342025-03-07T23:30:24.996ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96352025-03-07T23:30:24.996ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 109 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96362025-03-07T23:30:24.999ZDEBGtest_unauthorized (SEC): saga log event new_state = N109 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96372025-03-07T23:30:24.999ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("7479ca0f-f43a-4b6b-b208-b702fe6997b0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}) node_id = 109 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96382025-03-07T23:30:25.003ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96392025-03-07T23:30:25.003ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 110 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96402025-03-07T23:30:25.005ZDEBGtest_unauthorized (SEC): saga log event new_state = N110 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96412025-03-07T23:30:25.005ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 110 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96422025-03-07T23:30:25.009ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96432025-03-07T23:30:25.009ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 111 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96442025-03-07T23:30:25.013ZDEBGtest_unauthorized (SEC): saga log event new_state = N111 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96452025-03-07T23:30:25.013ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 111 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96462025-03-07T23:30:25.017ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96472025-03-07T23:30:25.017ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 112 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96482025-03-07T23:30:25.021ZDEBGtest_unauthorized (SEC): saga log event new_state = N112 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96492025-03-07T23:30:25.021ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 112 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96502025-03-07T23:30:25.037ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96512025-03-07T23:30:25.037ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 113 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96522025-03-07T23:30:25.041ZDEBGtest_unauthorized (SEC): saga log event new_state = N113 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96532025-03-07T23:30:25.041ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("de4487e7-4557-4ce0-b6b5-4e286a06e4e4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}) node_id = 113 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96542025-03-07T23:30:25.053ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96552025-03-07T23:30:25.054ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 114 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96562025-03-07T23:30:25.056ZDEBGtest_unauthorized (SEC): saga log event new_state = N114 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96572025-03-07T23:30:25.056ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 114 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96582025-03-07T23:30:25.059ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96592025-03-07T23:30:25.059ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 115 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96602025-03-07T23:30:25.063ZDEBGtest_unauthorized (SEC): saga log event new_state = N115 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96612025-03-07T23:30:25.063ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 115 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96622025-03-07T23:30:25.065ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96632025-03-07T23:30:25.065ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 116 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96642025-03-07T23:30:25.068ZDEBGtest_unauthorized (SEC): saga log event new_state = N116 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96652025-03-07T23:30:25.068ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 116 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96662025-03-07T23:30:25.072ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96672025-03-07T23:30:25.072ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 117 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96682025-03-07T23:30:25.083ZDEBGtest_unauthorized (SEC): saga log event new_state = N117 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96692025-03-07T23:30:25.083ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("683869fb-5b52-40da-9a43-335967c244b1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}) node_id = 117 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96702025-03-07T23:30:25.087ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96712025-03-07T23:30:25.087ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 118 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96722025-03-07T23:30:25.090ZDEBGtest_unauthorized (SEC): saga log event new_state = N118 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96732025-03-07T23:30:25.090ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 118 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96742025-03-07T23:30:25.107ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96752025-03-07T23:30:25.107ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 119 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96762025-03-07T23:30:25.110ZDEBGtest_unauthorized (SEC): saga log event new_state = N119 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96772025-03-07T23:30:25.110ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 119 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96782025-03-07T23:30:25.114ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96792025-03-07T23:30:25.114ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 120 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96802025-03-07T23:30:25.119ZDEBGtest_unauthorized (SEC): saga log event new_state = N120 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96812025-03-07T23:30:25.119ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 120 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96822025-03-07T23:30:25.122ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96832025-03-07T23:30:25.122ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 121 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96842025-03-07T23:30:25.126ZDEBGtest_unauthorized (SEC): saga log event new_state = N121 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96852025-03-07T23:30:25.126ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("642e52bd-b0c5-4dfd-a837-a404dff997a0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}) node_id = 121 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96862025-03-07T23:30:25.129ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96872025-03-07T23:30:25.129ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 122 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96882025-03-07T23:30:25.131ZDEBGtest_unauthorized (SEC): saga log event new_state = N122 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96892025-03-07T23:30:25.131ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 122 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96902025-03-07T23:30:25.134ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96912025-03-07T23:30:25.134ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 123 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96922025-03-07T23:30:25.137ZDEBGtest_unauthorized (SEC): saga log event new_state = N123 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96932025-03-07T23:30:25.137ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 123 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96942025-03-07T23:30:25.139ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96952025-03-07T23:30:25.139ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 124 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96962025-03-07T23:30:25.142ZDEBGtest_unauthorized (SEC): saga log event new_state = N124 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96972025-03-07T23:30:25.142ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 124 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
96982025-03-07T23:30:25.146ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
96992025-03-07T23:30:25.146ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 125 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97002025-03-07T23:30:25.149ZDEBGtest_unauthorized (SEC): saga log event new_state = N125 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97012025-03-07T23:30:25.149ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("5806c347-6295-47e3-98e8-29476d645e75"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}) node_id = 125 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97022025-03-07T23:30:25.153ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97032025-03-07T23:30:25.153ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 126 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97042025-03-07T23:30:25.156ZDEBGtest_unauthorized (SEC): saga log event new_state = N126 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97052025-03-07T23:30:25.156ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 126 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97062025-03-07T23:30:25.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
97072025-03-07T23:30:25.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
97082025-03-07T23:30:25.159ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
97092025-03-07T23:30:25.160ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
97102025-03-07T23:30:25.161ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97112025-03-07T23:30:25.161ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 127 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97122025-03-07T23:30:25.164ZDEBGtest_unauthorized (SEC): saga log event new_state = N127 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97132025-03-07T23:30:25.165ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 127 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97142025-03-07T23:30:25.165ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
97152025-03-07T23:30:25.165ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
97162025-03-07T23:30:25.167ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97172025-03-07T23:30:25.167ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 128 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97182025-03-07T23:30:25.168ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
97192025-03-07T23:30:25.168ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
97202025-03-07T23:30:25.172ZDEBGtest_unauthorized (SEC): saga log event new_state = N128 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97212025-03-07T23:30:25.173ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 128 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97222025-03-07T23:30:25.182ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97232025-03-07T23:30:25.182ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 129 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97242025-03-07T23:30:25.186ZDEBGtest_unauthorized (SEC): saga log event new_state = N129 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97252025-03-07T23:30:25.186ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("702d6071-b051-4ba1-8797-7cf14ab84851"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}) node_id = 129 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97262025-03-07T23:30:25.190ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97272025-03-07T23:30:25.190ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 130 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97282025-03-07T23:30:25.192ZDEBGtest_unauthorized (SEC): saga log event new_state = N130 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97292025-03-07T23:30:25.192ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 130 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97302025-03-07T23:30:25.195ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97312025-03-07T23:30:25.195ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 131 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97322025-03-07T23:30:25.198ZDEBGtest_unauthorized (SEC): saga log event new_state = N131 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97332025-03-07T23:30:25.198ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 131 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97342025-03-07T23:30:25.201ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97352025-03-07T23:30:25.201ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 132 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97362025-03-07T23:30:25.204ZDEBGtest_unauthorized (SEC): saga log event new_state = N132 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97372025-03-07T23:30:25.204ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 132 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97382025-03-07T23:30:25.206ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97392025-03-07T23:30:25.207ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 133 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97402025-03-07T23:30:25.217ZDEBGtest_unauthorized (SEC): saga log event new_state = N133 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97412025-03-07T23:30:25.217ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("cb550e14-1a14-4b52-b415-129861f5acbe"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}) node_id = 133 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97422025-03-07T23:30:25.221ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97432025-03-07T23:30:25.222ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 134 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97442025-03-07T23:30:25.225ZDEBGtest_unauthorized (SEC): saga log event new_state = N134 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97452025-03-07T23:30:25.225ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 134 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97462025-03-07T23:30:25.229ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97472025-03-07T23:30:25.229ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 135 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97482025-03-07T23:30:25.232ZDEBGtest_unauthorized (SEC): saga log event new_state = N135 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97492025-03-07T23:30:25.233ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 135 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97502025-03-07T23:30:25.235ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97512025-03-07T23:30:25.235ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 136 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97522025-03-07T23:30:25.243ZDEBGtest_unauthorized (SEC): saga log event new_state = N136 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97532025-03-07T23:30:25.243ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 136 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97542025-03-07T23:30:25.248ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97552025-03-07T23:30:25.248ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 137 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97562025-03-07T23:30:25.252ZDEBGtest_unauthorized (SEC): saga log event new_state = N137 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97572025-03-07T23:30:25.252ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6d8ec643-d9b4-44cc-96f2-4a2a483ba24f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}) node_id = 137 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97582025-03-07T23:30:25.263ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
97592025-03-07T23:30:25.265ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97602025-03-07T23:30:25.265ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 138 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97612025-03-07T23:30:25.271ZDEBGtest_unauthorized (SEC): saga log event new_state = N138 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97622025-03-07T23:30:25.271ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 138 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97632025-03-07T23:30:25.274ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97642025-03-07T23:30:25.274ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 139 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97652025-03-07T23:30:25.279ZDEBGtest_unauthorized (SEC): saga log event new_state = N139 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97662025-03-07T23:30:25.279ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 139 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97672025-03-07T23:30:25.282ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97682025-03-07T23:30:25.282ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 140 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97692025-03-07T23:30:25.285ZDEBGtest_unauthorized (SEC): saga log event new_state = N140 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97702025-03-07T23:30:25.285ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 140 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97712025-03-07T23:30:25.289ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97722025-03-07T23:30:25.289ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 141 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97732025-03-07T23:30:25.295ZDEBGtest_unauthorized (SEC): saga log event new_state = N141 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97742025-03-07T23:30:25.295ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0ec2841f-a66f-41f7-bda9-2c386a07bae1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}) node_id = 141 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97752025-03-07T23:30:25.299ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97762025-03-07T23:30:25.299ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 142 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97772025-03-07T23:30:25.304ZDEBGtest_unauthorized (SEC): saga log event new_state = N142 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97782025-03-07T23:30:25.304ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 142 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97792025-03-07T23:30:25.312ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97802025-03-07T23:30:25.312ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 143 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97812025-03-07T23:30:25.317ZDEBGtest_unauthorized (SEC): saga log event new_state = N143 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97822025-03-07T23:30:25.317ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 143 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97832025-03-07T23:30:25.321ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97842025-03-07T23:30:25.321ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 144 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97852025-03-07T23:30:25.324ZDEBGtest_unauthorized (SEC): saga log event new_state = N144 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97862025-03-07T23:30:25.324ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 144 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97872025-03-07T23:30:25.326ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97882025-03-07T23:30:25.327ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 145 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97892025-03-07T23:30:25.329ZDEBGtest_unauthorized (SEC): saga log event new_state = N145 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97902025-03-07T23:30:25.329ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("dc1e8bb1-7718-43dd-a84b-a085242641ad"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}) node_id = 145 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97912025-03-07T23:30:25.332ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97922025-03-07T23:30:25.332ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 146 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97932025-03-07T23:30:25.335ZDEBGtest_unauthorized (SEC): saga log event new_state = N146 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97942025-03-07T23:30:25.335ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 146 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97952025-03-07T23:30:25.338ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97962025-03-07T23:30:25.338ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 147 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97972025-03-07T23:30:25.341ZDEBGtest_unauthorized (SEC): saga log event new_state = N147 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
97982025-03-07T23:30:25.341ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 147 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
97992025-03-07T23:30:25.344ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98002025-03-07T23:30:25.344ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 148 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98012025-03-07T23:30:25.348ZDEBGtest_unauthorized (SEC): saga log event new_state = N148 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98022025-03-07T23:30:25.348ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 148 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98032025-03-07T23:30:25.359ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98042025-03-07T23:30:25.359ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 149 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98052025-03-07T23:30:25.363ZDEBGtest_unauthorized (SEC): saga log event new_state = N149 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98062025-03-07T23:30:25.363ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("59c53804-9292-47e4-902b-124deaddc36f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}) node_id = 149 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98072025-03-07T23:30:25.368ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98082025-03-07T23:30:25.368ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 150 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98092025-03-07T23:30:25.371ZDEBGtest_unauthorized (SEC): saga log event new_state = N150 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98102025-03-07T23:30:25.371ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 150 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98112025-03-07T23:30:25.374ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98122025-03-07T23:30:25.374ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 151 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98132025-03-07T23:30:25.377ZDEBGtest_unauthorized (SEC): saga log event new_state = N151 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98142025-03-07T23:30:25.378ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 151 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98152025-03-07T23:30:25.381ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98162025-03-07T23:30:25.381ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 152 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98172025-03-07T23:30:25.383ZDEBGtest_unauthorized (SEC): saga log event new_state = N152 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98182025-03-07T23:30:25.383ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 152 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98192025-03-07T23:30:25.387ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98202025-03-07T23:30:25.387ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 153 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98212025-03-07T23:30:25.389ZDEBGtest_unauthorized (SEC): saga log event new_state = N153 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98222025-03-07T23:30:25.389ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("89ebe751-1d71-48a8-acd0-36d950b58785"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}) node_id = 153 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98232025-03-07T23:30:25.393ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98242025-03-07T23:30:25.393ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 154 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98252025-03-07T23:30:25.395ZDEBGtest_unauthorized (SEC): saga log event new_state = N154 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98262025-03-07T23:30:25.396ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 154 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98272025-03-07T23:30:25.399ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98282025-03-07T23:30:25.399ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 155 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98292025-03-07T23:30:25.403ZDEBGtest_unauthorized (SEC): saga log event new_state = N155 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98302025-03-07T23:30:25.403ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 155 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98312025-03-07T23:30:25.407ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98322025-03-07T23:30:25.407ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 156 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98332025-03-07T23:30:25.410ZDEBGtest_unauthorized (SEC): saga log event new_state = N156 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98342025-03-07T23:30:25.410ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 156 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98352025-03-07T23:30:25.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
98362025-03-07T23:30:25.411ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
98372025-03-07T23:30:25.411ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5ab5228-1ace-4a1d-a50f-a31afea1f4ca uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
98382025-03-07T23:30:25.412ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5ab5228-1ace-4a1d-a50f-a31afea1f4ca resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
98392025-03-07T23:30:25.412ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5ab5228-1ace-4a1d-a50f-a31afea1f4ca roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
98402025-03-07T23:30:25.412ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5ab5228-1ace-4a1d-a50f-a31afea1f4ca resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
98412025-03-07T23:30:25.414ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98422025-03-07T23:30:25.414ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 157 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98432025-03-07T23:30:25.416ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5105 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5ab5228-1ace-4a1d-a50f-a31afea1f4ca response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
98442025-03-07T23:30:25.417ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5ab5228-1ace-4a1d-a50f-a31afea1f4ca", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:25 GMT"} })
98452025-03-07T23:30:25.417ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
98462025-03-07T23:30:25.418ZDEBGtest_unauthorized (SEC): saga log event new_state = N157 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98472025-03-07T23:30:25.418ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3e1b26f8-b9a8-432f-896b-5197ac7cab62"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}) node_id = 157 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98482025-03-07T23:30:25.418ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7da38d3f-b71d-43ae-9616-e3b8ee3cf286 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
98492025-03-07T23:30:25.418ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7da38d3f-b71d-43ae-9616-e3b8ee3cf286 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
98502025-03-07T23:30:25.419ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7da38d3f-b71d-43ae-9616-e3b8ee3cf286 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
98512025-03-07T23:30:25.419ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7da38d3f-b71d-43ae-9616-e3b8ee3cf286 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
98522025-03-07T23:30:25.421ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3231 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7da38d3f-b71d-43ae-9616-e3b8ee3cf286 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
98532025-03-07T23:30:25.423ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98542025-03-07T23:30:25.423ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 158 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98552025-03-07T23:30:25.424ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "7da38d3f-b71d-43ae-9616-e3b8ee3cf286", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:25 GMT"} })
98562025-03-07T23:30:25.424ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98572025-03-07T23:30:25.424ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
98582025-03-07T23:30:25.424ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
98592025-03-07T23:30:25.426ZDEBGtest_unauthorized (SEC): saga log event new_state = N158 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98602025-03-07T23:30:25.426ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 158 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98612025-03-07T23:30:25.430ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98622025-03-07T23:30:25.430ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 159 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98632025-03-07T23:30:25.440ZDEBGtest_unauthorized (SEC): saga log event new_state = N159 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98642025-03-07T23:30:25.440ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 159 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98652025-03-07T23:30:25.445ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98662025-03-07T23:30:25.445ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98672025-03-07T23:30:25.447ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98682025-03-07T23:30:25.447ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 160 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98692025-03-07T23:30:25.447ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 6242048b-bd77-4582-8646-7201bcf39073 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98702025-03-07T23:30:25.471ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 23432 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 6242048b-bd77-4582-8646-7201bcf39073 response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98712025-03-07T23:30:25.471ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
98722025-03-07T23:30:25.472ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
98732025-03-07T23:30:25.472ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
98742025-03-07T23:30:25.472ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98752025-03-07T23:30:25.517ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98762025-03-07T23:30:25.517ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98772025-03-07T23:30:25.517ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98782025-03-07T23:30:25.517ZDEBGtest_unauthorized (results-sink): inserting 24 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
98792025-03-07T23:30:25.517ZDEBGtest_unauthorized (results-sink-cluster): inserting 24 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
98802025-03-07T23:30:25.517ZDEBGtest_unauthorized (SEC): saga log event new_state = N160 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98812025-03-07T23:30:25.517ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 160 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98822025-03-07T23:30:25.518ZDEBGtest_unauthorized (clickhouse-client): unrolling 24 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
98832025-03-07T23:30:25.538ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
98842025-03-07T23:30:25.538ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
98852025-03-07T23:30:25.542ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98862025-03-07T23:30:25.542ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 161 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98872025-03-07T23:30:25.542ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
98882025-03-07T23:30:25.543ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("virtual_machine:check"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "instance_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "nexus_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "project_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "rack_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "reason", field_type: String, source: Metric, description: "" }, FieldSchema { name: "silo_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "sled_agent_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "sled_agent_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "sled_agent_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "state", field_type: String, source: Metric, description: "" }, FieldSchema { name: "vmm_id", field_type: Uuid, source: Target, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:30:25.538389226Z } timeseries_name = virtual_machine:check
98892025-03-07T23:30:25.543ZDEBGtest_unauthorized (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
98902025-03-07T23:30:25.543ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
98912025-03-07T23:30:25.545ZDEBGtest_unauthorized (SEC): saga log event new_state = N161 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98922025-03-07T23:30:25.545ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9aea0fe3-43b3-4796-bdff-70555c2ad07f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}) node_id = 161 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98932025-03-07T23:30:25.547ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
98942025-03-07T23:30:25.550ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98952025-03-07T23:30:25.550ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 162 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
98962025-03-07T23:30:25.551ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = fields_ipaddr
98972025-03-07T23:30:25.551ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 36 sql = INSERT INTO oximeter.fields_string FORMAT Native
98982025-03-07T23:30:25.553ZDEBGtest_unauthorized (SEC): saga log event new_state = N162 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
98992025-03-07T23:30:25.553ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 162 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99002025-03-07T23:30:25.554ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 36 table_name = fields_string
99012025-03-07T23:30:25.554ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 18 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
99022025-03-07T23:30:25.556ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99032025-03-07T23:30:25.557ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 163 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99042025-03-07T23:30:25.557ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 18 table_name = fields_u16
99052025-03-07T23:30:25.557ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 30 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
99062025-03-07T23:30:25.561ZDEBGtest_unauthorized (SEC): saga log event new_state = N163 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99072025-03-07T23:30:25.561ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 163 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99082025-03-07T23:30:25.561ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 30 table_name = fields_uuid
99092025-03-07T23:30:25.561ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
99102025-03-07T23:30:25.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
99112025-03-07T23:30:25.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
99122025-03-07T23:30:25.568ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99132025-03-07T23:30:25.568ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 164 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99142025-03-07T23:30:25.568ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_cumulativeu64
99152025-03-07T23:30:25.568ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 17 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
99162025-03-07T23:30:25.568ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
99172025-03-07T23:30:25.569ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
99182025-03-07T23:30:25.569ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
99192025-03-07T23:30:25.569ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
99202025-03-07T23:30:25.572ZDEBGtest_unauthorized (SEC): saga log event new_state = N164 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99212025-03-07T23:30:25.572ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 164 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99222025-03-07T23:30:25.574ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 17 table_name = measurements_histogramu64
99232025-03-07T23:30:25.574ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 6 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
99242025-03-07T23:30:25.574ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99252025-03-07T23:30:25.574ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 165 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99262025-03-07T23:30:25.576ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 6 table_name = measurements_i64
99272025-03-07T23:30:25.577ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
99282025-03-07T23:30:25.578ZDEBGtest_unauthorized (SEC): saga log event new_state = N165 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99292025-03-07T23:30:25.578ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 165 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99302025-03-07T23:30:25.581ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99312025-03-07T23:30:25.581ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 166 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99322025-03-07T23:30:25.590ZDEBGtest_unauthorized (SEC): saga log event new_state = N166 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99332025-03-07T23:30:25.590ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 166 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99342025-03-07T23:30:25.594ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99352025-03-07T23:30:25.594ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 168 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99362025-03-07T23:30:25.598ZDEBGtest_unauthorized (SEC): saga log event new_state = N168 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99372025-03-07T23:30:25.599ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 168 saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99382025-03-07T23:30:25.602ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99392025-03-07T23:30:25.602ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65
99402025-03-07T23:30:25.616ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99412025-03-07T23:30:25.618ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65 saga_name = instance-create saga_result = SagaResult { saga_id: c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65, saga_log: SagaLog { saga_id: c6bd58b0-f76c-41f2-b6b5-12d2af7cfc65, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "name": String("demo-stopped-instance"), "time_created": String("2025-03-07T23:30:21.977298Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:21.977298Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:21.977298Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("52d5748c-72ad-4b84-a177-f155857102c8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3cb4ace2-9552-42eb-a6ec-9816eea27c54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("eda0fda6-e1bd-4e57-8dd0-84be29940a07"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9322b608-6c35-47fa-aeeb-2ea71a9a7ebd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("44b925fa-aacf-4cca-94dc-47c9d9936abd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3af7ef94-38c2-4afe-928c-1d8b506336e5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0d1db6c8-0481-4dfe-8e18-d11e70feb329"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("ca7990c6-6c68-4b08-b7ac-a8d4ab92eb9f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("cb6c2934-75b9-4c44-9ec6-c499d9a1f1e1")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:23.045047Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:23.074130Z")}), 40: Succeeded(Object {"description": Null, "first_port": Number(0), "id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:23.045047Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:23.074130Z")}), 41: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("ff494495-7930-470c-bdaf-7512da8c9174"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0c47bb39-14bd-40f1-a551-b71bdb743b74"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("b894266f-d3de-46f2-a97c-56812e5ac154"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("d9bed123-c9e3-4922-a338-a3991f5f1224"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("59b6dc6e-36e0-417f-8937-dd267e948cae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("8eff62cd-a940-4081-8049-77dbc80d2d05"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("01bd76ea-059a-4311-9e4c-3d6529f0aae8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("7131f213-48f5-4f00-9a21-aec722ba1e60"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("90366dc7-fd43-4eff-b137-cf89a45abf6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9029ff68-2370-4f3c-9ba4-10ce6a050438"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("33751a32-22ef-400b-84e0-0352ea0d0ddf"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("02dab528-c62c-48bc-a617-519b6054fa98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("57d38196-7c3e-4d68-8184-230713dc4950"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("2f3c7351-b25e-4def-9517-e120edc77782"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6ef0e1d7-6318-4ea6-9e38-e401c5037de1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6a9a16b4-6387-4505-acd4-02dc77786bdd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("85779176-eb5f-4698-b5ca-fef6a6a174ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("7479ca0f-f43a-4b6b-b208-b702fe6997b0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("de4487e7-4557-4ce0-b6b5-4e286a06e4e4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("683869fb-5b52-40da-9a43-335967c244b1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("642e52bd-b0c5-4dfd-a837-a404dff997a0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("5806c347-6295-47e3-98e8-29476d645e75"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("702d6071-b051-4ba1-8797-7cf14ab84851"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("cb550e14-1a14-4b52-b415-129861f5acbe"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6d8ec643-d9b4-44cc-96f2-4a2a483ba24f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0ec2841f-a66f-41f7-bda9-2c386a07bae1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("dc1e8bb1-7718-43dd-a84b-a085242641ad"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("59c53804-9292-47e4-902b-124deaddc36f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("89ebe751-1d71-48a8-acd0-36d950b58785"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3e1b26f8-b9a8-432f-896b-5197ac7cab62"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9aea0fe3-43b3-4796-bdff-70555c2ad07f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Object {"description": Null, "first_port": Number(0), "id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:23.045047Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:23.074130Z")}, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Object {"description": Null, "first_port": Number(0), "id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "ip": String("10.0.0.2/32"), "ip_pool_id": String("7bc17b4a-94f3-40f4-a993-a5d9dac4904d"), "ip_pool_range_id": String("26d4a7ca-9cc0-4e87-a08a-7d61c224a440"), "is_probe": Bool(false), "is_service": Bool(false), "kind": String("Ephemeral"), "last_port": Number(65535), "name": Null, "parent_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "project_id": Null, "state": String("Attaching"), "time_created": String("2025-03-07T23:30:23.045047Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:23.074130Z")}, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("75bdc1b0-921f-498b-a70e-b04fb3118e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("ff494495-7930-470c-bdaf-7512da8c9174"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9029ff68-2370-4f3c-9ba4-10ce6a050438"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("33751a32-22ef-400b-84e0-0352ea0d0ddf"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("02dab528-c62c-48bc-a617-519b6054fa98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("57d38196-7c3e-4d68-8184-230713dc4950"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("2f3c7351-b25e-4def-9517-e120edc77782"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6ef0e1d7-6318-4ea6-9e38-e401c5037de1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6a9a16b4-6387-4505-acd4-02dc77786bdd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("85779176-eb5f-4698-b5ca-fef6a6a174ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("7479ca0f-f43a-4b6b-b208-b702fe6997b0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("de4487e7-4557-4ce0-b6b5-4e286a06e4e4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0c47bb39-14bd-40f1-a551-b71bdb743b74"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("683869fb-5b52-40da-9a43-335967c244b1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("642e52bd-b0c5-4dfd-a837-a404dff997a0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("5806c347-6295-47e3-98e8-29476d645e75"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("702d6071-b051-4ba1-8797-7cf14ab84851"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("cb550e14-1a14-4b52-b415-129861f5acbe"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("6d8ec643-d9b4-44cc-96f2-4a2a483ba24f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0ec2841f-a66f-41f7-bda9-2c386a07bae1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("dc1e8bb1-7718-43dd-a84b-a085242641ad"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("59c53804-9292-47e4-902b-124deaddc36f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("89ebe751-1d71-48a8-acd0-36d950b58785"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("b894266f-d3de-46f2-a97c-56812e5ac154"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3e1b26f8-b9a8-432f-896b-5197ac7cab62"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9aea0fe3-43b3-4796-bdff-70555c2ad07f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("d9bed123-c9e3-4922-a338-a3991f5f1224"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("59b6dc6e-36e0-417f-8937-dd267e948cae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("8eff62cd-a940-4081-8049-77dbc80d2d05"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("01bd76ea-059a-4311-9e4c-3d6529f0aae8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("7131f213-48f5-4f00-9a21-aec722ba1e60"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("90366dc7-fd43-4eff-b137-cf89a45abf6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("demo-instance"), "identity": Object {"description": String(""), "id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "name": String("demo-stopped-instance"), "time_created": String("2025-03-07T23:30:21.977298Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:21.977298Z")}, "memory": Number(17179869184), "ncpus": Number(1), "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-07T23:30:21.977298Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array []}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("52d5748c-72ad-4b84-a177-f155857102c8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3cb4ace2-9552-42eb-a6ec-9816eea27c54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("eda0fda6-e1bd-4e57-8dd0-84be29940a07"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("9322b608-6c35-47fa-aeeb-2ea71a9a7ebd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("44b925fa-aacf-4cca-94dc-47c9d9936abd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("3af7ef94-38c2-4afe-928c-1d8b506336e5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("0d1db6c8-0481-4dfe-8e18-d11e70feb329"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8"), "new_id": String("ca7990c6-6c68-4b08-b7ac-a8d4ab92eb9f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String(""), "disks": Array [], "external_ips": Array [Object {"pool": String("default"), "type": String("ephemeral")}], "hostname": String("demo-instance"), "memory": Number(17179869184), "name": String("demo-stopped-instance"), "ncpus": Number(1), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("cb6c2934-75b9-4c44-9ec6-c499d9a1f1e1"), "stopped_instance": Null} }) }
99422025-03-07T23:30:25.622ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99432025-03-07T23:30:25.622ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99442025-03-07T23:30:25.622ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99452025-03-07T23:30:25.622ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
99462025-03-07T23:30:25.623ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99472025-03-07T23:30:25.623ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99482025-03-07T23:30:25.625ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99492025-03-07T23:30:25.628ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99502025-03-07T23:30:25.628ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99512025-03-07T23:30:25.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99522025-03-07T23:30:25.630ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
99532025-03-07T23:30:25.630ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
99542025-03-07T23:30:25.630ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
99552025-03-07T23:30:25.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } uri = /v1/instances?project=demo-project
99562025-03-07T23:30:25.632ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
99572025-03-07T23:30:25.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99582025-03-07T23:30:25.632ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99592025-03-07T23:30:25.632ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99602025-03-07T23:30:25.637ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
99612025-03-07T23:30:25.637ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99622025-03-07T23:30:25.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99632025-03-07T23:30:25.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99642025-03-07T23:30:25.644ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
99652025-03-07T23:30:25.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99662025-03-07T23:30:25.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99672025-03-07T23:30:25.645ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99682025-03-07T23:30:25.649ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
99692025-03-07T23:30:25.661ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } result = Ok(()) uri = /v1/instances?project=demo-project
99702025-03-07T23:30:25.661ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } uri = /v1/instances?project=demo-project
99712025-03-07T23:30:25.661ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
99722025-03-07T23:30:25.661ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99732025-03-07T23:30:25.661ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99742025-03-07T23:30:25.661ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99752025-03-07T23:30:25.673ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
99762025-03-07T23:30:25.673ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99772025-03-07T23:30:25.673ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99782025-03-07T23:30:25.674ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99792025-03-07T23:30:25.678ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
99802025-03-07T23:30:25.679ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99812025-03-07T23:30:25.679ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99822025-03-07T23:30:25.679ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99832025-03-07T23:30:25.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
99842025-03-07T23:30:25.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } result = Ok(()) uri = /v1/instances?project=demo-project
99852025-03-07T23:30:25.696ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
99862025-03-07T23:30:25.696ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
99872025-03-07T23:30:25.697ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
99882025-03-07T23:30:25.704ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start
99892025-03-07T23:30:25.705ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"demo-instance","identity":{"description":"","id":"2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8","name":"demo-stopped-instance","time_created":"2025-03-07T23:30:21.977298Z","time_deleted":null,"time_modified":"2025-03-07T23:30:21.977298Z"},"memory":17179869184,"ncpus":1,"project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2025-03-07T23:30:21.977298Z"},"updater_gen":1,"updater_id":null,"user_data":[]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10} saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99902025-03-07T23:30:25.705ZINFOtest_unauthorized (SecStore): creating saga saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start
99912025-03-07T23:30:25.709ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start
99922025-03-07T23:30:25.711ZINFOtest_unauthorized (SEC): saga start saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99932025-03-07T23:30:25.711ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99942025-03-07T23:30:25.711ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
99952025-03-07T23:30:25.719ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99962025-03-07T23:30:25.719ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
99972025-03-07T23:30:25.723ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
99982025-03-07T23:30:25.723ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
99992025-03-07T23:30:25.726ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100002025-03-07T23:30:25.726ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("d4b9b891-06d9-41c7-97b8-1bf0e3e901b2")) node_id = 0 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100012025-03-07T23:30:25.732ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100022025-03-07T23:30:25.733ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100032025-03-07T23:30:25.739ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
100042025-03-07T23:30:25.739ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
100052025-03-07T23:30:25.740ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
100062025-03-07T23:30:25.767ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 failed sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100072025-03-07T23:30:25.767ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Failed(ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} }) node_id = 1 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100082025-03-07T23:30:25.775ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Unwinding saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100092025-03-07T23:30:25.775ZINFOtest_unauthorized (SecStore): updating state new_state = unwinding saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100102025-03-07T23:30:25.792ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 undo_started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100112025-03-07T23:30:25.792ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoStarted node_id = 0 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100122025-03-07T23:30:25.797ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 undo_finished sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100132025-03-07T23:30:25.797ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoFinished node_id = 0 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100142025-03-07T23:30:25.803ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 undo_started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100152025-03-07T23:30:25.803ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoStarted node_id = 10 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100162025-03-07T23:30:25.810ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 undo_finished sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100172025-03-07T23:30:25.811ZDEBGtest_unauthorized (SecStore): recording saga event event_type = UndoFinished node_id = 10 saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100182025-03-07T23:30:25.814ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
100192025-03-07T23:30:25.814ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda
100202025-03-07T23:30:25.821ZWARNtest_unauthorized (SEC): saga finished action_error_node_name = "sled_id" action_error_source = ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} } result = failure saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af undo_result = success
100212025-03-07T23:30:25.821ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = e66adebb-7eef-4228-b7e2-d312e5416dda saga_name = instance-start saga_result = SagaResult { saga_id: e66adebb-7eef-4228-b7e2-d312e5416dda, saga_log: SagaLog { saga_id: e66adebb-7eef-4228-b7e2-d312e5416dda, unwinding: true, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 failed, N000 undo_started, N000 undo_finished, N010 undo_started, N010 undo_finished], node_status: {0: UndoFinished, 1: Failed(ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} }), 10: UndoFinished} }, kind: Err(SagaResultErr { error_node_name: "sled_id", error_source: ActionFailed { source_error: Object {"InsufficientCapacity": Object {"message": Object {"external_message": String("Failed to place instance: Could not find any valid sled on which this instance can be placed"), "internal_context": String("Failed to place instance: Could not find any valid sled on which this instance can be placed")}}} }, undo_failure: None }) }
100222025-03-07T23:30:25.821ZINFOtest_unauthorized (nexus): failed to start newly-created instance error = Other(InsufficientCapacity { message: MessagePair { external_message: "Failed to place instance: Could not find any valid sled on which this instance can be placed", internal_context: "saga ACTION error at node \\"sled_id\\": Failed to place instance: Could not find any valid sled on which this instance can be placed" } }) instance_id = 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8
100232025-03-07T23:30:25.821ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100242025-03-07T23:30:25.822ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100252025-03-07T23:30:25.825ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100262025-03-07T23:30:25.826ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 6 reason = Signaled
100272025-03-07T23:30:25.826ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
100282025-03-07T23:30:25.826ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
100292025-03-07T23:30:25.826ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
100302025-03-07T23:30:25.826ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
100312025-03-07T23:30:25.826ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
100322025-03-07T23:30:25.827ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
100332025-03-07T23:30:25.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100342025-03-07T23:30:25.829ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100352025-03-07T23:30:25.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100362025-03-07T23:30:25.831ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
100372025-03-07T23:30:25.837ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
100382025-03-07T23:30:25.837ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
100392025-03-07T23:30:25.837ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
100402025-03-07T23:30:25.837ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
100412025-03-07T23:30:25.837ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
100422025-03-07T23:30:25.838ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
100432025-03-07T23:30:25.839ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100442025-03-07T23:30:25.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100452025-03-07T23:30:25.840ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100462025-03-07T23:30:25.841ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
100472025-03-07T23:30:25.848ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
100482025-03-07T23:30:25.848ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
100492025-03-07T23:30:25.848ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
100502025-03-07T23:30:25.849ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
100512025-03-07T23:30:25.851ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } uri = /v1/instances?project=demo-project
100522025-03-07T23:30:25.851ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
100532025-03-07T23:30:25.851ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100542025-03-07T23:30:25.851ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100552025-03-07T23:30:25.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100562025-03-07T23:30:25.936ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
100572025-03-07T23:30:25.936ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
100582025-03-07T23:30:25.937ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:52153 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
100592025-03-07T23:30:25.937ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:52153 req_id = fd62359a-384c-4eed-a2a0-dbbec9c2f86b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
100602025-03-07T23:30:25.938ZINFOtest_unauthorized (dropshot): request completed latency_us = 329 local_addr = [::1]:57532 method = GET remote_addr = [::1]:52153 req_id = fd62359a-384c-4eed-a2a0-dbbec9c2f86b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
100612025-03-07T23:30:25.938ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd62359a-384c-4eed-a2a0-dbbec9c2f86b", "content-length": "210", "date": "Fri, 07 Mar 2025 23:30:25 GMT"} })
100622025-03-07T23:30:25.938ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
100632025-03-07T23:30:25.938ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
100642025-03-07T23:30:25.939ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
100652025-03-07T23:30:25.940ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
100662025-03-07T23:30:25.940ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100672025-03-07T23:30:25.940ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100682025-03-07T23:30:25.940ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100692025-03-07T23:30:25.945ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
100702025-03-07T23:30:25.945ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100712025-03-07T23:30:25.946ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100722025-03-07T23:30:25.947ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100732025-03-07T23:30:25.954ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
100742025-03-07T23:30:25.968ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } result = Ok(()) uri = /v1/instances?project=demo-project
100752025-03-07T23:30:25.968ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } uri = /v1/instances?project=demo-project
100762025-03-07T23:30:25.968ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
100772025-03-07T23:30:25.968ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100782025-03-07T23:30:25.968ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100792025-03-07T23:30:25.969ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100802025-03-07T23:30:25.973ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
100812025-03-07T23:30:25.973ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100822025-03-07T23:30:25.973ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100832025-03-07T23:30:25.974ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100842025-03-07T23:30:25.975ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b: {10.0.0.0: {faa36720-8d06-4c5a-8e59-3859e80311a0}, 10.0.0.1: {faa36720-8d06-4c5a-8e59-3859e80311a0}}} background_task = vpc_route_manager sled = sim-b6d65341
100852025-03-07T23:30:25.975ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
100862025-03-07T23:30:25.975ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52153 req_id = 04674667-2d42-4f60-a888-19c8bcbde816 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
100872025-03-07T23:30:25.975ZINFOtest_unauthorized (dropshot): request completed latency_us = 299 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52153 req_id = 04674667-2d42-4f60-a888-19c8bcbde816 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
100882025-03-07T23:30:25.976ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "04674667-2d42-4f60-a888-19c8bcbde816", "date": "Fri, 07 Mar 2025 23:30:25 GMT"} })
100892025-03-07T23:30:25.976ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
100902025-03-07T23:30:25.976ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
100912025-03-07T23:30:25.977ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
100922025-03-07T23:30:25.979ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
100932025-03-07T23:30:25.979ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
100942025-03-07T23:30:25.979ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
100952025-03-07T23:30:25.979ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
100962025-03-07T23:30:25.979ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
100972025-03-07T23:30:25.979ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
100982025-03-07T23:30:25.981ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
100992025-03-07T23:30:25.983ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
101002025-03-07T23:30:25.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ById(2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8) } result = Ok(()) uri = /v1/instances?project=demo-project
101012025-03-07T23:30:25.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database uri = /v1/instances?project=demo-project
101022025-03-07T23:30:25.994ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
101032025-03-07T23:30:25.995ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
101042025-03-07T23:30:25.995ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
101052025-03-07T23:30:25.996ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
101062025-03-07T23:30:26.005ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
101072025-03-07T23:30:26.012ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 4459738 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d709542d-c9b2-406a-a411-0f6b8fe06f8f response_code = 201 uri = /v1/instances?project=demo-project
101082025-03-07T23:30:26.012ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 push not needed background_task = vpc_route_manager
101092025-03-07T23:30:26.012ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/vpc-routes
101102025-03-07T23:30:26.016ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52153 req_id = c9d34aab-6230-4b67-a879-56e01ea9872d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
101112025-03-07T23:30:26.016ZINFOtest_unauthorized (dropshot): request completed latency_us = 458 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:52153 req_id = c9d34aab-6230-4b67-a879-56e01ea9872d response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
101122025-03-07T23:30:26.016ZINFOtest_unauthorized (external client test context): client received response status = 201
101132025-03-07T23:30:26.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
101142025-03-07T23:30:26.017ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 204, headers: {"x-request-id": "c9d34aab-6230-4b67-a879-56e01ea9872d", "date": "Fri, 07 Mar 2025 23:30:25 GMT"} })
101152025-03-07T23:30:26.019ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 192.764424ms iteration = 6 status = {}
101162025-03-07T23:30:26.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 uri = /v1/affinity-groups?project=demo-project
101172025-03-07T23:30:26.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 uri = /v1/affinity-groups?project=demo-project
101182025-03-07T23:30:26.020ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups?project=demo-project
101192025-03-07T23:30:26.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101202025-03-07T23:30:26.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101212025-03-07T23:30:26.020ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101222025-03-07T23:30:26.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101232025-03-07T23:30:26.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101242025-03-07T23:30:26.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101252025-03-07T23:30:26.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
101262025-03-07T23:30:26.027ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
101272025-03-07T23:30:26.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101282025-03-07T23:30:26.027ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101292025-03-07T23:30:26.033ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101302025-03-07T23:30:26.036ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
101312025-03-07T23:30:26.037ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101322025-03-07T23:30:26.037ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101332025-03-07T23:30:26.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101342025-03-07T23:30:26.041ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
101352025-03-07T23:30:26.052ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
101362025-03-07T23:30:26.052ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101372025-03-07T23:30:26.052ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101382025-03-07T23:30:26.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101392025-03-07T23:30:26.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
101402025-03-07T23:30:26.060ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
101412025-03-07T23:30:26.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101422025-03-07T23:30:26.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101432025-03-07T23:30:26.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101442025-03-07T23:30:26.063ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
101452025-03-07T23:30:26.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
101462025-03-07T23:30:26.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
101472025-03-07T23:30:26.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
101482025-03-07T23:30:26.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
101492025-03-07T23:30:26.080ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
101502025-03-07T23:30:26.080ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 uri = /v1/affinity-groups?project=demo-project
101512025-03-07T23:30:26.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101522025-03-07T23:30:26.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101532025-03-07T23:30:26.081ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101542025-03-07T23:30:26.106ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101552025-03-07T23:30:26.106ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101562025-03-07T23:30:26.107ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101572025-03-07T23:30:26.110ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
101582025-03-07T23:30:26.110ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
101592025-03-07T23:30:26.110ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101602025-03-07T23:30:26.110ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101612025-03-07T23:30:26.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101622025-03-07T23:30:26.113ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
101632025-03-07T23:30:26.114ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101642025-03-07T23:30:26.114ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101652025-03-07T23:30:26.114ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101662025-03-07T23:30:26.122ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
101672025-03-07T23:30:26.122ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101682025-03-07T23:30:26.122ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101692025-03-07T23:30:26.123ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101702025-03-07T23:30:26.126ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
101712025-03-07T23:30:26.136ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101722025-03-07T23:30:26.136ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
101732025-03-07T23:30:26.136ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
101742025-03-07T23:30:26.136ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101752025-03-07T23:30:26.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101762025-03-07T23:30:26.137ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101772025-03-07T23:30:26.140ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
101782025-03-07T23:30:26.140ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101792025-03-07T23:30:26.140ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101802025-03-07T23:30:26.141ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101812025-03-07T23:30:26.143ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
101822025-03-07T23:30:26.144ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101832025-03-07T23:30:26.144ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101842025-03-07T23:30:26.144ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101852025-03-07T23:30:26.148ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
101862025-03-07T23:30:26.155ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101872025-03-07T23:30:26.155ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database uri = /v1/affinity-groups?project=demo-project
101882025-03-07T23:30:26.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
101892025-03-07T23:30:26.155ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
101902025-03-07T23:30:26.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
101912025-03-07T23:30:26.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
101922025-03-07T23:30:26.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
101932025-03-07T23:30:26.159ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
101942025-03-07T23:30:26.163ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
101952025-03-07T23:30:26.163ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
101962025-03-07T23:30:26.166ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
101972025-03-07T23:30:26.166ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
101982025-03-07T23:30:26.257ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
101992025-03-07T23:30:26.257ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
102002025-03-07T23:30:26.257ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
102012025-03-07T23:30:26.258ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
102022025-03-07T23:30:26.279ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 259928 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95d5f7c6-7724-4cae-99a0-7e51685682b9 response_code = 201 uri = /v1/affinity-groups?project=demo-project
102032025-03-07T23:30:26.280ZINFOtest_unauthorized (external client test context): client received response status = 201
102042025-03-07T23:30:26.280ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102052025-03-07T23:30:26.280ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102062025-03-07T23:30:26.280ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102072025-03-07T23:30:26.280ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102082025-03-07T23:30:26.280ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102092025-03-07T23:30:26.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102102025-03-07T23:30:26.281ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102112025-03-07T23:30:26.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102122025-03-07T23:30:26.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102132025-03-07T23:30:26.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102142025-03-07T23:30:26.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
102152025-03-07T23:30:26.286ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
102162025-03-07T23:30:26.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102172025-03-07T23:30:26.286ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102182025-03-07T23:30:26.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102192025-03-07T23:30:26.289ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
102202025-03-07T23:30:26.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102212025-03-07T23:30:26.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102222025-03-07T23:30:26.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102232025-03-07T23:30:26.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
102242025-03-07T23:30:26.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
102252025-03-07T23:30:26.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102262025-03-07T23:30:26.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102272025-03-07T23:30:26.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102282025-03-07T23:30:26.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
102292025-03-07T23:30:26.299ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
102302025-03-07T23:30:26.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102312025-03-07T23:30:26.299ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102322025-03-07T23:30:26.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102332025-03-07T23:30:26.304ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
102342025-03-07T23:30:26.304ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
102352025-03-07T23:30:26.304ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
102362025-03-07T23:30:26.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
102372025-03-07T23:30:26.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
102382025-03-07T23:30:26.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
102392025-03-07T23:30:26.328ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102402025-03-07T23:30:26.328ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102412025-03-07T23:30:26.328ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102422025-03-07T23:30:26.328ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102432025-03-07T23:30:26.331ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102442025-03-07T23:30:26.331ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102452025-03-07T23:30:26.332ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102462025-03-07T23:30:26.335ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102472025-03-07T23:30:26.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102482025-03-07T23:30:26.336ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102492025-03-07T23:30:26.341ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102502025-03-07T23:30:26.341ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102512025-03-07T23:30:26.341ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102522025-03-07T23:30:26.341ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102532025-03-07T23:30:26.342ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102542025-03-07T23:30:26.350ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102552025-03-07T23:30:26.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102562025-03-07T23:30:26.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102572025-03-07T23:30:26.352ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102582025-03-07T23:30:26.356ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102592025-03-07T23:30:26.356ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102602025-03-07T23:30:26.356ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102612025-03-07T23:30:26.357ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102622025-03-07T23:30:26.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102632025-03-07T23:30:26.374ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102642025-03-07T23:30:26.374ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102652025-03-07T23:30:26.374ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102662025-03-07T23:30:26.374ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102672025-03-07T23:30:26.379ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102682025-03-07T23:30:26.379ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102692025-03-07T23:30:26.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102702025-03-07T23:30:26.387ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102712025-03-07T23:30:26.387ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102722025-03-07T23:30:26.389ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102732025-03-07T23:30:26.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102742025-03-07T23:30:26.395ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102752025-03-07T23:30:26.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102762025-03-07T23:30:26.395ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102772025-03-07T23:30:26.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102782025-03-07T23:30:26.413ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102792025-03-07T23:30:26.413ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102802025-03-07T23:30:26.413ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102812025-03-07T23:30:26.422ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102822025-03-07T23:30:26.428ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102832025-03-07T23:30:26.429ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102842025-03-07T23:30:26.429ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102852025-03-07T23:30:26.431ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102862025-03-07T23:30:26.441ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102872025-03-07T23:30:26.453ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102882025-03-07T23:30:26.453ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102892025-03-07T23:30:26.454ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102902025-03-07T23:30:26.454ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102912025-03-07T23:30:26.454ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102922025-03-07T23:30:26.454ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102932025-03-07T23:30:26.458ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102942025-03-07T23:30:26.458ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102952025-03-07T23:30:26.458ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102962025-03-07T23:30:26.459ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102972025-03-07T23:30:26.463ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102982025-03-07T23:30:26.463ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
102992025-03-07T23:30:26.463ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103002025-03-07T23:30:26.464ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103012025-03-07T23:30:26.476ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103022025-03-07T23:30:26.529ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103032025-03-07T23:30:26.529ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103042025-03-07T23:30:26.529ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103052025-03-07T23:30:26.532ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103062025-03-07T23:30:26.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
103072025-03-07T23:30:26.561ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
103082025-03-07T23:30:26.566ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 286188 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b672c726-0e83-4a7e-a54f-23ab7f90a9b2 response_code = 201 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103092025-03-07T23:30:26.567ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
103102025-03-07T23:30:26.567ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
103112025-03-07T23:30:26.567ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
103122025-03-07T23:30:26.567ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
103132025-03-07T23:30:26.568ZINFOtest_unauthorized (external client test context): client received response status = 201
103142025-03-07T23:30:26.568ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
103152025-03-07T23:30:26.568ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab uri = /v1/anti-affinity-groups?project=demo-project
103162025-03-07T23:30:26.568ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab uri = /v1/anti-affinity-groups?project=demo-project
103172025-03-07T23:30:26.568ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups?project=demo-project
103182025-03-07T23:30:26.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103192025-03-07T23:30:26.568ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103202025-03-07T23:30:26.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103212025-03-07T23:30:26.574ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103222025-03-07T23:30:26.575ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103232025-03-07T23:30:26.575ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103242025-03-07T23:30:26.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
103252025-03-07T23:30:26.578ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
103262025-03-07T23:30:26.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103272025-03-07T23:30:26.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103282025-03-07T23:30:26.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103292025-03-07T23:30:26.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
103302025-03-07T23:30:26.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103312025-03-07T23:30:26.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103322025-03-07T23:30:26.585ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103332025-03-07T23:30:26.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
103342025-03-07T23:30:26.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
103352025-03-07T23:30:26.595ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103362025-03-07T23:30:26.596ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103372025-03-07T23:30:26.596ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103382025-03-07T23:30:26.598ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
103392025-03-07T23:30:26.598ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
103402025-03-07T23:30:26.598ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103412025-03-07T23:30:26.599ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103422025-03-07T23:30:26.599ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103432025-03-07T23:30:26.602ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
103442025-03-07T23:30:26.602ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103452025-03-07T23:30:26.602ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103462025-03-07T23:30:26.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103472025-03-07T23:30:26.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
103482025-03-07T23:30:26.613ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
103492025-03-07T23:30:26.613ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab uri = /v1/anti-affinity-groups?project=demo-project
103502025-03-07T23:30:26.613ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103512025-03-07T23:30:26.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103522025-03-07T23:30:26.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103532025-03-07T23:30:26.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103542025-03-07T23:30:26.617ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103552025-03-07T23:30:26.618ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103562025-03-07T23:30:26.623ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
103572025-03-07T23:30:26.623ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
103582025-03-07T23:30:26.623ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103592025-03-07T23:30:26.623ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103602025-03-07T23:30:26.624ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103612025-03-07T23:30:26.628ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
103622025-03-07T23:30:26.628ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103632025-03-07T23:30:26.629ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103642025-03-07T23:30:26.629ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103652025-03-07T23:30:26.635ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
103662025-03-07T23:30:26.636ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103672025-03-07T23:30:26.636ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103682025-03-07T23:30:26.636ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103692025-03-07T23:30:26.636ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
103702025-03-07T23:30:26.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103712025-03-07T23:30:26.646ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
103722025-03-07T23:30:26.646ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
103732025-03-07T23:30:26.646ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103742025-03-07T23:30:26.646ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103752025-03-07T23:30:26.647ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103762025-03-07T23:30:26.653ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
103772025-03-07T23:30:26.653ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103782025-03-07T23:30:26.653ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103792025-03-07T23:30:26.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103802025-03-07T23:30:26.658ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
103812025-03-07T23:30:26.658ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103822025-03-07T23:30:26.658ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103832025-03-07T23:30:26.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103842025-03-07T23:30:26.663ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
103852025-03-07T23:30:26.676ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103862025-03-07T23:30:26.676ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database uri = /v1/anti-affinity-groups?project=demo-project
103872025-03-07T23:30:26.676ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
103882025-03-07T23:30:26.677ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
103892025-03-07T23:30:26.798ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 229698 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d0b250e-1c2f-48e3-a27b-b2c8349c00ab response_code = 201 uri = /v1/anti-affinity-groups?project=demo-project
103902025-03-07T23:30:26.799ZINFOtest_unauthorized (external client test context): client received response status = 201
103912025-03-07T23:30:26.799ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103922025-03-07T23:30:26.805ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103932025-03-07T23:30:26.806ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103942025-03-07T23:30:26.806ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
103952025-03-07T23:30:26.806ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103962025-03-07T23:30:26.806ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
103972025-03-07T23:30:26.810ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
103982025-03-07T23:30:26.849ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
103992025-03-07T23:30:26.850ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104002025-03-07T23:30:26.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104012025-03-07T23:30:26.858ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
104022025-03-07T23:30:26.859ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
104032025-03-07T23:30:26.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104042025-03-07T23:30:26.859ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104052025-03-07T23:30:26.860ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104062025-03-07T23:30:26.872ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
104072025-03-07T23:30:26.873ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104082025-03-07T23:30:26.877ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104092025-03-07T23:30:26.877ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104102025-03-07T23:30:26.886ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
104112025-03-07T23:30:26.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
104122025-03-07T23:30:26.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104132025-03-07T23:30:26.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104142025-03-07T23:30:26.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104152025-03-07T23:30:26.899ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
104162025-03-07T23:30:26.903ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
104172025-03-07T23:30:26.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104182025-03-07T23:30:26.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104192025-03-07T23:30:26.904ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104202025-03-07T23:30:26.908ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
104212025-03-07T23:30:26.908ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
104222025-03-07T23:30:26.908ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
104232025-03-07T23:30:26.909ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
104242025-03-07T23:30:26.912ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
104252025-03-07T23:30:26.920ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
104262025-03-07T23:30:26.920ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104272025-03-07T23:30:26.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104282025-03-07T23:30:26.921ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104292025-03-07T23:30:26.921ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104302025-03-07T23:30:26.924ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104312025-03-07T23:30:26.925ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104322025-03-07T23:30:26.926ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104332025-03-07T23:30:26.933ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104342025-03-07T23:30:26.933ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104352025-03-07T23:30:26.935ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104362025-03-07T23:30:26.941ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104372025-03-07T23:30:26.941ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104382025-03-07T23:30:26.941ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104392025-03-07T23:30:26.941ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104402025-03-07T23:30:26.943ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104412025-03-07T23:30:26.949ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104422025-03-07T23:30:26.949ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104432025-03-07T23:30:26.949ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104442025-03-07T23:30:26.950ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104452025-03-07T23:30:26.954ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104462025-03-07T23:30:26.954ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104472025-03-07T23:30:26.954ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104482025-03-07T23:30:26.955ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104492025-03-07T23:30:26.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104502025-03-07T23:30:26.977ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104512025-03-07T23:30:26.977ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104522025-03-07T23:30:26.977ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104532025-03-07T23:30:26.978ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104542025-03-07T23:30:26.982ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104552025-03-07T23:30:26.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104562025-03-07T23:30:26.983ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104572025-03-07T23:30:26.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104582025-03-07T23:30:26.985ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104592025-03-07T23:30:26.986ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104602025-03-07T23:30:26.988ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104612025-03-07T23:30:26.989ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104622025-03-07T23:30:26.989ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104632025-03-07T23:30:26.989ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104642025-03-07T23:30:26.989ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104652025-03-07T23:30:26.992ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104662025-03-07T23:30:26.992ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104672025-03-07T23:30:26.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104682025-03-07T23:30:26.993ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104692025-03-07T23:30:26.999ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104702025-03-07T23:30:26.999ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104712025-03-07T23:30:26.999ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104722025-03-07T23:30:27.001ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104732025-03-07T23:30:27.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104742025-03-07T23:30:27.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104752025-03-07T23:30:27.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104762025-03-07T23:30:27.020ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104772025-03-07T23:30:27.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104782025-03-07T23:30:27.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104792025-03-07T23:30:27.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104802025-03-07T23:30:27.027ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104812025-03-07T23:30:27.027ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104822025-03-07T23:30:27.027ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104832025-03-07T23:30:27.028ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104842025-03-07T23:30:27.031ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104852025-03-07T23:30:27.032ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104862025-03-07T23:30:27.032ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104872025-03-07T23:30:27.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104882025-03-07T23:30:27.035ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104892025-03-07T23:30:27.044ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104902025-03-07T23:30:27.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104912025-03-07T23:30:27.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104922025-03-07T23:30:27.044ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104932025-03-07T23:30:27.053ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 248236 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 394f4d42-4f87-48b7-b449-d2b2fff97918 response_code = 201 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
104942025-03-07T23:30:27.054ZINFOtest_unauthorized (external client test context): client received response status = 201
104952025-03-07T23:30:27.055ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
104962025-03-07T23:30:27.055ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
104972025-03-07T23:30:27.055ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
104982025-03-07T23:30:27.055ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
104992025-03-07T23:30:27.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105002025-03-07T23:30:27.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105012025-03-07T23:30:27.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105022025-03-07T23:30:27.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105032025-03-07T23:30:27.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105042025-03-07T23:30:27.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105052025-03-07T23:30:27.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
105062025-03-07T23:30:27.066ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
105072025-03-07T23:30:27.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105082025-03-07T23:30:27.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105092025-03-07T23:30:27.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105102025-03-07T23:30:27.071ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
105112025-03-07T23:30:27.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105122025-03-07T23:30:27.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105132025-03-07T23:30:27.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105142025-03-07T23:30:27.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
105152025-03-07T23:30:27.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
105162025-03-07T23:30:27.088ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105172025-03-07T23:30:27.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105182025-03-07T23:30:27.089ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105192025-03-07T23:30:27.105ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
105202025-03-07T23:30:27.105ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
105212025-03-07T23:30:27.105ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105222025-03-07T23:30:27.105ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105232025-03-07T23:30:27.106ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105242025-03-07T23:30:27.110ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
105252025-03-07T23:30:27.110ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
105262025-03-07T23:30:27.110ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
105272025-03-07T23:30:27.111ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
105282025-03-07T23:30:27.113ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
105292025-03-07T23:30:27.124ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
105302025-03-07T23:30:27.124ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105312025-03-07T23:30:27.127ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105322025-03-07T23:30:27.127ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105332025-03-07T23:30:27.128ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105342025-03-07T23:30:27.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105352025-03-07T23:30:27.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105362025-03-07T23:30:27.131ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105372025-03-07T23:30:27.140ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105382025-03-07T23:30:27.140ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105392025-03-07T23:30:27.142ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105402025-03-07T23:30:27.145ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105412025-03-07T23:30:27.145ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105422025-03-07T23:30:27.145ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105432025-03-07T23:30:27.145ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105442025-03-07T23:30:27.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105452025-03-07T23:30:27.151ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105462025-03-07T23:30:27.151ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105472025-03-07T23:30:27.151ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105482025-03-07T23:30:27.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105492025-03-07T23:30:27.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
105502025-03-07T23:30:27.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
105512025-03-07T23:30:27.157ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105522025-03-07T23:30:27.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105532025-03-07T23:30:27.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105542025-03-07T23:30:27.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105552025-03-07T23:30:27.158ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
105562025-03-07T23:30:27.159ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
105572025-03-07T23:30:27.163ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105582025-03-07T23:30:27.179ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105592025-03-07T23:30:27.179ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105602025-03-07T23:30:27.179ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105612025-03-07T23:30:27.180ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105622025-03-07T23:30:27.180ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
105632025-03-07T23:30:27.181ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
105642025-03-07T23:30:27.183ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105652025-03-07T23:30:27.183ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105662025-03-07T23:30:27.184ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105672025-03-07T23:30:27.186ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
105682025-03-07T23:30:27.186ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
105692025-03-07T23:30:27.188ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105702025-03-07T23:30:27.188ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105712025-03-07T23:30:27.188ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105722025-03-07T23:30:27.192ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105732025-03-07T23:30:27.192ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105742025-03-07T23:30:27.192ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105752025-03-07T23:30:27.192ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105762025-03-07T23:30:27.193ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105772025-03-07T23:30:27.198ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105782025-03-07T23:30:27.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105792025-03-07T23:30:27.198ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105802025-03-07T23:30:27.199ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105812025-03-07T23:30:27.204ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105822025-03-07T23:30:27.205ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105832025-03-07T23:30:27.205ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105842025-03-07T23:30:27.206ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105852025-03-07T23:30:27.212ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105862025-03-07T23:30:27.225ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105872025-03-07T23:30:27.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105882025-03-07T23:30:27.225ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105892025-03-07T23:30:27.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105902025-03-07T23:30:27.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105912025-03-07T23:30:27.226ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105922025-03-07T23:30:27.229ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105932025-03-07T23:30:27.229ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105942025-03-07T23:30:27.229ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105952025-03-07T23:30:27.230ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105962025-03-07T23:30:27.234ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105972025-03-07T23:30:27.234ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105982025-03-07T23:30:27.234ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
105992025-03-07T23:30:27.235ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106002025-03-07T23:30:27.240ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106012025-03-07T23:30:27.263ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106022025-03-07T23:30:27.263ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106032025-03-07T23:30:27.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106042025-03-07T23:30:27.271ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106052025-03-07T23:30:27.275ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
106062025-03-07T23:30:27.310ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 255110 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2f3da0-23a6-4d3f-8d7f-5c94a82a2e64 response_code = 201 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
106072025-03-07T23:30:27.310ZINFOtest_unauthorized (external client test context): client received response status = 201
106082025-03-07T23:30:27.310ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106092025-03-07T23:30:27.311ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106102025-03-07T23:30:27.312ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106112025-03-07T23:30:27.318ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106122025-03-07T23:30:27.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106132025-03-07T23:30:27.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106142025-03-07T23:30:27.319ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106152025-03-07T23:30:27.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106162025-03-07T23:30:27.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106172025-03-07T23:30:27.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106182025-03-07T23:30:27.336ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
106192025-03-07T23:30:27.336ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
106202025-03-07T23:30:27.340ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106212025-03-07T23:30:27.340ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106222025-03-07T23:30:27.342ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106232025-03-07T23:30:27.353ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
106242025-03-07T23:30:27.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106252025-03-07T23:30:27.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106262025-03-07T23:30:27.355ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106272025-03-07T23:30:27.357ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
106282025-03-07T23:30:27.378ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
106292025-03-07T23:30:27.378ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106302025-03-07T23:30:27.378ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106312025-03-07T23:30:27.378ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106322025-03-07T23:30:27.404ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
106332025-03-07T23:30:27.404ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
106342025-03-07T23:30:27.404ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106352025-03-07T23:30:27.404ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106362025-03-07T23:30:27.406ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106372025-03-07T23:30:27.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
106382025-03-07T23:30:27.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106392025-03-07T23:30:27.412ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b7c075a-0551-41e3-ab08-f7089fcb0296 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106402025-03-07T23:30:27.413ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b7c075a-0551-41e3-ab08-f7089fcb0296 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106412025-03-07T23:30:27.413ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b7c075a-0551-41e3-ab08-f7089fcb0296 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106422025-03-07T23:30:27.414ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b7c075a-0551-41e3-ab08-f7089fcb0296 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106432025-03-07T23:30:27.414ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
106442025-03-07T23:30:27.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
106452025-03-07T23:30:27.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
106462025-03-07T23:30:27.415ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
106472025-03-07T23:30:27.418ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5360 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6b7c075a-0551-41e3-ab08-f7089fcb0296 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
106482025-03-07T23:30:27.428ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
106492025-03-07T23:30:27.449ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
106502025-03-07T23:30:27.456ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106512025-03-07T23:30:27.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106522025-03-07T23:30:27.456ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106532025-03-07T23:30:27.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106542025-03-07T23:30:27.459ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b7c075a-0551-41e3-ab08-f7089fcb0296", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:26 GMT"} })
106552025-03-07T23:30:27.459ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
106562025-03-07T23:30:27.459ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 12374c41-7bf0-42c5-ab63-d6ca40af339b uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
106572025-03-07T23:30:27.461ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 12374c41-7bf0-42c5-ab63-d6ca40af339b resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
106582025-03-07T23:30:27.461ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 12374c41-7bf0-42c5-ab63-d6ca40af339b roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
106592025-03-07T23:30:27.463ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 12374c41-7bf0-42c5-ab63-d6ca40af339b resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
106602025-03-07T23:30:27.463ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106612025-03-07T23:30:27.464ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106622025-03-07T23:30:27.465ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106632025-03-07T23:30:27.470ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106642025-03-07T23:30:27.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106652025-03-07T23:30:27.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106662025-03-07T23:30:27.487ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 28008 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 12374c41-7bf0-42c5-ab63-d6ca40af339b response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
106672025-03-07T23:30:27.492ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
106682025-03-07T23:30:27.493ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
106692025-03-07T23:30:27.493ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
106702025-03-07T23:30:27.493ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "12374c41-7bf0-42c5-ab63-d6ca40af339b", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:26 GMT"} })
106712025-03-07T23:30:27.493ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
106722025-03-07T23:30:27.493ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106732025-03-07T23:30:27.493ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
106742025-03-07T23:30:27.498ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106752025-03-07T23:30:27.498ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106762025-03-07T23:30:27.499ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106772025-03-07T23:30:27.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106782025-03-07T23:30:27.512ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106792025-03-07T23:30:27.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106802025-03-07T23:30:27.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106812025-03-07T23:30:27.513ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106822025-03-07T23:30:27.540ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106832025-03-07T23:30:27.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106842025-03-07T23:30:27.545ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106852025-03-07T23:30:27.546ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106862025-03-07T23:30:27.554ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106872025-03-07T23:30:27.554ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106882025-03-07T23:30:27.555ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106892025-03-07T23:30:27.556ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106902025-03-07T23:30:27.560ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106912025-03-07T23:30:27.574ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106922025-03-07T23:30:27.576ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 265043 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4301eaaa-0698-4d01-81a7-271b41a70ac9 response_code = 200 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
106932025-03-07T23:30:27.577ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106942025-03-07T23:30:27.577ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106952025-03-07T23:30:27.577ZINFOtest_unauthorized (external client test context): client received response status = 200
106962025-03-07T23:30:27.578ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
106972025-03-07T23:30:27.580ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 uri = /v1/snapshots?project=demo-project
106982025-03-07T23:30:27.580ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
106992025-03-07T23:30:27.581ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
107002025-03-07T23:30:27.581ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
107012025-03-07T23:30:27.581ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
107022025-03-07T23:30:27.581ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 uri = /v1/snapshots?project=demo-project
107032025-03-07T23:30:27.581ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots?project=demo-project
107042025-03-07T23:30:27.581ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107052025-03-07T23:30:27.581ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107062025-03-07T23:30:27.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107072025-03-07T23:30:27.589ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107082025-03-07T23:30:27.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107092025-03-07T23:30:27.589ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107102025-03-07T23:30:27.593ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
107112025-03-07T23:30:27.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
107122025-03-07T23:30:27.593ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107132025-03-07T23:30:27.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107142025-03-07T23:30:27.596ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107152025-03-07T23:30:27.601ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
107162025-03-07T23:30:27.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107172025-03-07T23:30:27.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107182025-03-07T23:30:27.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107192025-03-07T23:30:27.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
107202025-03-07T23:30:27.610ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
107212025-03-07T23:30:27.610ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107222025-03-07T23:30:27.610ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107232025-03-07T23:30:27.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107242025-03-07T23:30:27.614ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
107252025-03-07T23:30:27.615ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
107262025-03-07T23:30:27.615ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107272025-03-07T23:30:27.615ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107282025-03-07T23:30:27.615ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107292025-03-07T23:30:27.620ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
107302025-03-07T23:30:27.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
107312025-03-07T23:30:27.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
107322025-03-07T23:30:27.620ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
107332025-03-07T23:30:27.622ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
107342025-03-07T23:30:27.627ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
107352025-03-07T23:30:27.627ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 uri = /v1/snapshots?project=demo-project
107362025-03-07T23:30:27.627ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107372025-03-07T23:30:27.627ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107382025-03-07T23:30:27.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107392025-03-07T23:30:27.634ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
107402025-03-07T23:30:27.635ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
107412025-03-07T23:30:27.635ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
107422025-03-07T23:30:27.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107432025-03-07T23:30:27.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107442025-03-07T23:30:27.639ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107452025-03-07T23:30:27.641ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
107462025-03-07T23:30:27.641ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
107472025-03-07T23:30:27.641ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107482025-03-07T23:30:27.641ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107492025-03-07T23:30:27.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107502025-03-07T23:30:27.645ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
107512025-03-07T23:30:27.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107522025-03-07T23:30:27.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107532025-03-07T23:30:27.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107542025-03-07T23:30:27.649ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
107552025-03-07T23:30:27.649ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107562025-03-07T23:30:27.649ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107572025-03-07T23:30:27.650ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107582025-03-07T23:30:27.654ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
107592025-03-07T23:30:27.664ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
107602025-03-07T23:30:27.664ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107612025-03-07T23:30:27.664ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107622025-03-07T23:30:27.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107632025-03-07T23:30:27.674ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107642025-03-07T23:30:27.674ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107652025-03-07T23:30:27.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107662025-03-07T23:30:27.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107672025-03-07T23:30:27.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107682025-03-07T23:30:27.686ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107692025-03-07T23:30:27.697ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/snapshots?project=demo-project
107702025-03-07T23:30:27.697ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
107712025-03-07T23:30:27.697ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107722025-03-07T23:30:27.698ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107732025-03-07T23:30:27.699ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107742025-03-07T23:30:27.714ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
107752025-03-07T23:30:27.714ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107762025-03-07T23:30:27.714ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107772025-03-07T23:30:27.715ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107782025-03-07T23:30:27.720ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
107792025-03-07T23:30:27.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database uri = /v1/snapshots?project=demo-project
107802025-03-07T23:30:27.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
107812025-03-07T23:30:27.722ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
107822025-03-07T23:30:27.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
107832025-03-07T23:30:27.745ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/snapshots?project=demo-project
107842025-03-07T23:30:27.746ZINFOtest_unauthorized (SagaExecutor): preparing saga saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
107852025-03-07T23:30:27.747ZINFOtest_unauthorized (SEC): saga create dag = {"end_node":23,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[22,0,null],[21,23,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateSnapshotId","name":"snapshot_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVolumeId","name":"volume_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDestinationVolumeId","name":"destination_volume_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateLockId","name":"lock_id"}},{"Action":{"action_name":"snapshot_create.take_volume_lock","label":"TakeVolumeLock","name":"volume_lock"}},{"Action":{"action_name":"snapshot_create.regions_alloc","label":"RegionsAlloc","name":"datasets_and_regions"}},{"Action":{"action_name":"snapshot_create.regions_ensure_undo","label":"RegionsEnsureUndo","name":"regions_ensure_undo"}},{"Action":{"action_name":"snapshot_create.regions_ensure","label":"RegionsEnsure","name":"regions_ensure"}},{"Action":{"action_name":"snapshot_create.create_destination_volume_record","label":"CreateDestinationVolumeRecord","name":"created_destination_volume"}},{"Action":{"action_name":"snapshot_create.create_snapshot_record","label":"CreateSnapshotRecord","name":"created_snapshot"}},{"Action":{"action_name":"snapshot_create.space_account","label":"SpaceAccount","name":"no_result"}},{"Action":{"action_name":"snapshot_create.get_pantry_address","label":"GetPantryAddress","name":"pantry_address"}},{"Action":{"action_name":"snapshot_create.attach_disk_to_pantry","label":"AttachDiskToPantry","name":"disk_generation_number"}},{"Action":{"action_name":"snapshot_create.call_pantry_attach_for_disk","label":"CallPantryAttachForDisk","name":"call_pantry_attach_for_disk"}},{"Action":{"action_name":"snapshot_create.call_pantry_snapshot_for_disk","label":"CallPantrySnapshotForDisk","name":"call_pantry_snapshot_for_disk"}},{"Action":{"action_name":"snapshot_create.call_pantry_detach_for_disk","label":"CallPantryDetachForDisk","name":"call_pantry_detach_for_disk"}},{"Action":{"action_name":"snapshot_create.start_running_snapshot_undo","label":"StartRunningSnapshotUndo","name":"ssc_not_used"}},{"Action":{"action_name":"snapshot_create.start_running_snapshot","label":"StartRunningSnapshot","name":"replace_sockets_map"}},{"Action":{"action_name":"snapshot_create.create_volume_record","label":"CreateVolumeRecord","name":"created_volume"}},{"Action":{"action_name":"snapshot_create.finalize_snapshot_record","label":"FinalizeSnapshotRecord","name":"finalized_snapshot"}},{"Action":{"action_name":"snapshot_create.detach_disk_from_pantry","label":"DetachDiskFromPantry","name":"detach_disk_from_pantry"}},{"Action":{"action_name":"snapshot_create.release_volume_lock","label":"ReleaseVolumeLock","name":"volume_unlock"}},{"Start":{"params":{"attach_instance_id":null,"create_params":{"description":"","disk":"demo-disk","name":"demo-snapshot"},"disk_id":"73275cd2-2539-4bad-bf9b-1c88b1e0aa34","project_id":"581ba6bb-1990-42cd-9dc5-6371c2e527c7","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}},"silo_id":"001de000-5110-4000-8000-000000000000","use_the_pantry":true}}},"End"]},"saga_name":"snapshot-create","start_node":22} saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107862025-03-07T23:30:27.747ZINFOtest_unauthorized (SecStore): creating saga saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
107872025-03-07T23:30:27.785ZINFOtest_unauthorized (SagaExecutor): starting saga saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
107882025-03-07T23:30:27.785ZINFOtest_unauthorized (SEC): saga start saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107892025-03-07T23:30:27.785ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107902025-03-07T23:30:27.785ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 22 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
107912025-03-07T23:30:27.802ZDEBGtest_unauthorized (SEC): saga log event new_state = N022 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107922025-03-07T23:30:27.802ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
107932025-03-07T23:30:27.824ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107942025-03-07T23:30:27.824ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 0 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
107952025-03-07T23:30:27.839ZDEBGtest_unauthorized (SEC): saga log event new_state = N000 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107962025-03-07T23:30:27.839ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("5491bbba-7e49-45a0-8b6b-907587ab9704")) node_id = 0 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
107972025-03-07T23:30:27.846ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
107982025-03-07T23:30:27.846ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 1 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
107992025-03-07T23:30:27.859ZDEBGtest_unauthorized (SEC): saga log event new_state = N001 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108002025-03-07T23:30:27.859ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("1d7d51e2-323d-49fa-ad13-f0513202928a")) node_id = 1 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108012025-03-07T23:30:27.872ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108022025-03-07T23:30:27.872ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 2 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108032025-03-07T23:30:27.895ZDEBGtest_unauthorized (SEC): saga log event new_state = N002 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108042025-03-07T23:30:27.895ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")) node_id = 2 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108052025-03-07T23:30:27.900ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108062025-03-07T23:30:27.900ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 3 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108072025-03-07T23:30:27.907ZDEBGtest_unauthorized (SEC): saga log event new_state = N003 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108082025-03-07T23:30:27.908ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(String("e455df99-d8fc-4215-97ae-43ae7bf53ad1")) node_id = 3 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108092025-03-07T23:30:27.916ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108102025-03-07T23:30:27.916ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 4 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108112025-03-07T23:30:27.920ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108122025-03-07T23:30:27.920ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108132025-03-07T23:30:27.921ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108142025-03-07T23:30:27.925ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108152025-03-07T23:30:27.925ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108162025-03-07T23:30:27.926ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108172025-03-07T23:30:27.929ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108182025-03-07T23:30:27.929ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108192025-03-07T23:30:27.929ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108202025-03-07T23:30:27.937ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108212025-03-07T23:30:27.937ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108222025-03-07T23:30:27.938ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108232025-03-07T23:30:27.938ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108242025-03-07T23:30:27.938ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108252025-03-07T23:30:27.942ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108262025-03-07T23:30:27.942ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108272025-03-07T23:30:27.942ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108282025-03-07T23:30:27.943ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108292025-03-07T23:30:27.948ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108302025-03-07T23:30:27.948ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108312025-03-07T23:30:27.949ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108322025-03-07T23:30:27.950ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108332025-03-07T23:30:27.957ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108342025-03-07T23:30:27.972ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108352025-03-07T23:30:27.972ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108362025-03-07T23:30:27.972ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108372025-03-07T23:30:27.973ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = TakeVolumeLock
108382025-03-07T23:30:27.983ZDEBGtest_unauthorized (SEC): saga log event new_state = N004 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108392025-03-07T23:30:27.983ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108402025-03-07T23:30:27.986ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108412025-03-07T23:30:27.986ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 5 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108422025-03-07T23:30:27.988ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108432025-03-07T23:30:27.988ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108442025-03-07T23:30:27.989ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108452025-03-07T23:30:27.991ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108462025-03-07T23:30:27.991ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108472025-03-07T23:30:27.992ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108482025-03-07T23:30:28.002ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108492025-03-07T23:30:28.003ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108502025-03-07T23:30:28.004ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108512025-03-07T23:30:28.007ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108522025-03-07T23:30:28.008ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108532025-03-07T23:30:28.008ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108542025-03-07T23:30:28.008ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108552025-03-07T23:30:28.009ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108562025-03-07T23:30:28.012ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108572025-03-07T23:30:28.012ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108582025-03-07T23:30:28.012ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108592025-03-07T23:30:28.013ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108602025-03-07T23:30:28.017ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108612025-03-07T23:30:28.017ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108622025-03-07T23:30:28.017ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108632025-03-07T23:30:28.018ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108642025-03-07T23:30:28.021ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108652025-03-07T23:30:28.033ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108662025-03-07T23:30:28.033ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108672025-03-07T23:30:28.033ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108682025-03-07T23:30:28.033ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = RegionsAlloc
108692025-03-07T23:30:28.096ZINFOtest_unauthorized (datastore): Allocated regions for volume datasets_and_regions = [(CrucibleDataset { identity: CrucibleDatasetIdentity { id: 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset), time_created: 2025-03-07T23:30:05.411623Z, time_modified: 2025-03-07T23:30:05.411623Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 9dcb348c-3741-440e-ad18-bffcbe7ca303, ip: ::1, port: SqlU16(47503), size_used: 4294967296 }, Region { identity: RegionIdentity { id: 7d1f4a23-9f5e-4a2b-b998-64b66e94b03d, time_created: 2025-03-07T23:30:28.053987Z, time_modified: 2025-03-07T23:30:28.053987Z }, dataset_id: 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset), volume_id: 17893f46-5efa-4924-8ce8-e96bbf4e22e8 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset), time_created: 2025-03-07T23:30:03.742942Z, time_modified: 2025-03-07T23:30:03.742942Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 72fa80df-1134-4c26-8f56-47af05a6836f, ip: ::1, port: SqlU16(36988), size_used: 6442450944 }, Region { identity: RegionIdentity { id: 5d407922-28af-44a9-8ce6-ebfd42695d7d, time_created: 2025-03-07T23:30:28.053987Z, time_modified: 2025-03-07T23:30:28.053987Z }, dataset_id: 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset), volume_id: 17893f46-5efa-4924-8ce8-e96bbf4e22e8 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false }), (CrucibleDataset { identity: CrucibleDatasetIdentity { id: c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset), time_created: 2025-03-07T23:30:07.282286Z, time_modified: 2025-03-07T23:30:07.282286Z }, time_deleted: None, rcgen: Generation(Generation(1)), pool_id: 3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f, ip: ::1, port: SqlU16(63315), size_used: 6442450944 }, Region { identity: RegionIdentity { id: 36969eea-7179-4dd5-a47b-72cc57ded900, time_created: 2025-03-07T23:30:28.053987Z, time_modified: 2025-03-07T23:30:28.053987Z }, dataset_id: c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset), volume_id: 17893f46-5efa-4924-8ce8-e96bbf4e22e8 (volume), block_size: ByteCount(ByteCount(4096)), blocks_per_extent: 16384, extent_count: 32, port: None, read_only: false, deleting: false })] maybe_snapshot_id = None volume_id = 17893f46-5efa-4924-8ce8-e96bbf4e22e8
108702025-03-07T23:30:28.097ZDEBGtest_unauthorized (SEC): saga log event new_state = N005 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108712025-03-07T23:30:28.097ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [Array [Object {"identity": Object {"id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "time_created": String("2025-03-07T23:30:05.411623Z"), "time_modified": String("2025-03-07T23:30:05.411623Z")}, "ip": String("::1"), "pool_id": String("9dcb348c-3741-440e-ad18-bffcbe7ca303"), "port": Number(47503), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("7d1f4a23-9f5e-4a2b-b998-64b66e94b03d"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}], Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("5d407922-28af-44a9-8ce6-ebfd42695d7d"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("36969eea-7179-4dd5-a47b-72cc57ded900"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}]]) node_id = 5 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108722025-03-07T23:30:28.102ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108732025-03-07T23:30:28.102ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 6 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108742025-03-07T23:30:28.105ZDEBGtest_unauthorized (SEC): saga log event new_state = N006 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108752025-03-07T23:30:28.105ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108762025-03-07T23:30:28.108ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108772025-03-07T23:30:28.108ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 7 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108782025-03-07T23:30:28.117ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:47503 method = POST remote_addr = [::1]:39737 req_id = 165a40ab-2e1a-4e10-a912-85ee30401256 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108792025-03-07T23:30:28.117ZINFOtest_unauthorized (SledAgent): created region 7d1f4a23-9f5e-4a2b-b998-64b66e94b03d end_port = 1100 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1050
108802025-03-07T23:30:28.118ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 337 local_addr = [::1]:47503 method = POST remote_addr = [::1]:39737 req_id = 165a40ab-2e1a-4e10-a912-85ee30401256 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108812025-03-07T23:30:28.119ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = aa6dfd09-fc8b-42c8-932b-f3091a4e020e server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108822025-03-07T23:30:28.119ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = ac9a6c42-feed-400c-bf4d-87ab51e78761 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108832025-03-07T23:30:28.119ZINFOtest_unauthorized (SledAgent): created region 5d407922-28af-44a9-8ce6-ebfd42695d7d end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
108842025-03-07T23:30:28.120ZINFOtest_unauthorized (SledAgent): created region 36969eea-7179-4dd5-a47b-72cc57ded900 end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
108852025-03-07T23:30:28.120ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 622 local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = aa6dfd09-fc8b-42c8-932b-f3091a4e020e response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108862025-03-07T23:30:28.120ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 573 local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = ac9a6c42-feed-400c-bf4d-87ab51e78761 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions
108872025-03-07T23:30:28.126ZDEBGtest_unauthorized (SEC): saga log event new_state = N007 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108882025-03-07T23:30:28.126ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": Number(4096), "id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "key": String("ybEcajyae4lHmB/8mlZsJBW/1hVf9+Xe1r8u97CmpEk="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1002"), String("[::1]:1051"), String("[::1]:1152")]}, "type": String("region")}], "type": String("volume")}) node_id = 7 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108892025-03-07T23:30:28.131ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
108902025-03-07T23:30:28.131ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 8 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
108912025-03-07T23:30:28.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
108922025-03-07T23:30:28.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
108932025-03-07T23:30:28.158ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
108942025-03-07T23:30:28.160ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
108952025-03-07T23:30:28.166ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
108962025-03-07T23:30:28.166ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
108972025-03-07T23:30:28.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
108982025-03-07T23:30:28.172ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
108992025-03-07T23:30:28.172ZDEBGtest_unauthorized (SEC): saga log event new_state = N008 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
109002025-03-07T23:30:28.173ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
109012025-03-07T23:30:28.176ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
109022025-03-07T23:30:28.176ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 9 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
109032025-03-07T23:30:28.180ZINFOtest_unauthorized (SagaExecutor): grabbing disk by name demo-disk saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
109042025-03-07T23:30:28.180ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109052025-03-07T23:30:28.180ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109062025-03-07T23:30:28.181ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109072025-03-07T23:30:28.184ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109082025-03-07T23:30:28.184ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109092025-03-07T23:30:28.186ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109102025-03-07T23:30:28.188ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109112025-03-07T23:30:28.188ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109122025-03-07T23:30:28.189ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109132025-03-07T23:30:28.191ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109142025-03-07T23:30:28.191ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109152025-03-07T23:30:28.191ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109162025-03-07T23:30:28.191ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109172025-03-07T23:30:28.192ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109182025-03-07T23:30:28.195ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109192025-03-07T23:30:28.195ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109202025-03-07T23:30:28.195ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109212025-03-07T23:30:28.196ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109222025-03-07T23:30:28.200ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109232025-03-07T23:30:28.201ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109242025-03-07T23:30:28.201ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109252025-03-07T23:30:28.201ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109262025-03-07T23:30:28.212ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109272025-03-07T23:30:28.233ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109282025-03-07T23:30:28.233ZINFOtest_unauthorized (SagaExecutor): creating snapshot 5491bbba-7e49-45a0-8b6b-907587ab9704 from disk 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
109292025-03-07T23:30:28.233ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109302025-03-07T23:30:28.233ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109312025-03-07T23:30:28.234ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109322025-03-07T23:30:28.244ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109332025-03-07T23:30:28.245ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109342025-03-07T23:30:28.247ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109352025-03-07T23:30:28.249ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109362025-03-07T23:30:28.249ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109372025-03-07T23:30:28.249ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109382025-03-07T23:30:28.250ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109392025-03-07T23:30:28.251ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109402025-03-07T23:30:28.257ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109412025-03-07T23:30:28.257ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109422025-03-07T23:30:28.262ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109432025-03-07T23:30:28.263ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109442025-03-07T23:30:28.266ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
109452025-03-07T23:30:28.266ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
109462025-03-07T23:30:28.267ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
109472025-03-07T23:30:28.267ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
109482025-03-07T23:30:28.270ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109492025-03-07T23:30:28.270ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109502025-03-07T23:30:28.271ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109512025-03-07T23:30:28.271ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109522025-03-07T23:30:28.276ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109532025-03-07T23:30:28.288ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109542025-03-07T23:30:28.288ZTRACtest_unauthorized (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109552025-03-07T23:30:28.288ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109562025-03-07T23:30:28.288ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109572025-03-07T23:30:28.288ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109582025-03-07T23:30:28.289ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109592025-03-07T23:30:28.300ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109602025-03-07T23:30:28.300ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109612025-03-07T23:30:28.300ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109622025-03-07T23:30:28.301ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109632025-03-07T23:30:28.307ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109642025-03-07T23:30:28.307ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109652025-03-07T23:30:28.308ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109662025-03-07T23:30:28.314ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109672025-03-07T23:30:28.320ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109682025-03-07T23:30:28.343ZDEBGtest_unauthorized (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109692025-03-07T23:30:28.343ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109702025-03-07T23:30:28.343ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109712025-03-07T23:30:28.344ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateSnapshotRecord
109722025-03-07T23:30:28.432ZINFOtest_unauthorized (SagaExecutor): created snapshot 5491bbba-7e49-45a0-8b6b-907587ab9704 ok saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
109732025-03-07T23:30:28.432ZDEBGtest_unauthorized (SEC): saga log event new_state = N009 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
109742025-03-07T23:30:28.432ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "gen": Number(1), "identity": Object {"description": String(""), "id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:30:28.233177Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:28.233177Z")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "size": Number(2147483648), "state": String("Creating"), "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a")}) node_id = 9 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
109752025-03-07T23:30:28.439ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
109762025-03-07T23:30:28.440ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 10 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
109772025-03-07T23:30:28.443ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = SpaceAccount
109782025-03-07T23:30:28.444ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = SpaceAccount
109792025-03-07T23:30:28.444ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = SpaceAccount
109802025-03-07T23:30:28.458ZDEBGtest_unauthorized (SEC): saga log event new_state = N010 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
109812025-03-07T23:30:28.458ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
109822025-03-07T23:30:28.462ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
109832025-03-07T23:30:28.463ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 11 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
109842025-03-07T23:30:28.467ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109852025-03-07T23:30:28.467ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109862025-03-07T23:30:28.468ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109872025-03-07T23:30:28.470ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109882025-03-07T23:30:28.470ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109892025-03-07T23:30:28.471ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109902025-03-07T23:30:28.485ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109912025-03-07T23:30:28.485ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109922025-03-07T23:30:28.487ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109932025-03-07T23:30:28.496ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109942025-03-07T23:30:28.496ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109952025-03-07T23:30:28.501ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109962025-03-07T23:30:28.501ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109972025-03-07T23:30:28.502ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109982025-03-07T23:30:28.509ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
109992025-03-07T23:30:28.509ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110002025-03-07T23:30:28.509ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110012025-03-07T23:30:28.510ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110022025-03-07T23:30:28.516ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110032025-03-07T23:30:28.516ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110042025-03-07T23:30:28.516ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110052025-03-07T23:30:28.518ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110062025-03-07T23:30:28.521ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110072025-03-07T23:30:28.530ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = GetPantryAddress
110082025-03-07T23:30:28.530ZINFOtest_unauthorized (SagaExecutor): using pantry at [::1]:37181 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
110092025-03-07T23:30:28.531ZDEBGtest_unauthorized (SEC): saga log event new_state = N011 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
110102025-03-07T23:30:28.531ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Array [String("[::1]:37181"), Bool(false)]) node_id = 11 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
110112025-03-07T23:30:28.531ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = bfd8c140-98cd-4da9-baa5-5156d9b2225c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
110122025-03-07T23:30:28.531ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 198 local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = bfd8c140-98cd-4da9-baa5-5156d9b2225c response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
110132025-03-07T23:30:28.536ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
110142025-03-07T23:30:28.536ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 12 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
110152025-03-07T23:30:28.539ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110162025-03-07T23:30:28.539ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110172025-03-07T23:30:28.541ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110182025-03-07T23:30:28.544ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110192025-03-07T23:30:28.544ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110202025-03-07T23:30:28.545ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110212025-03-07T23:30:28.546ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110222025-03-07T23:30:28.546ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110232025-03-07T23:30:28.547ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110242025-03-07T23:30:28.550ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110252025-03-07T23:30:28.550ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110262025-03-07T23:30:28.550ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110272025-03-07T23:30:28.550ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110282025-03-07T23:30:28.551ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110292025-03-07T23:30:28.553ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110302025-03-07T23:30:28.553ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110312025-03-07T23:30:28.554ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110322025-03-07T23:30:28.556ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110332025-03-07T23:30:28.560ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110342025-03-07T23:30:28.560ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110352025-03-07T23:30:28.560ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110362025-03-07T23:30:28.561ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110372025-03-07T23:30:28.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
110382025-03-07T23:30:28.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
110392025-03-07T23:30:28.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
110402025-03-07T23:30:28.565ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
110412025-03-07T23:30:28.565ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
110422025-03-07T23:30:28.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
110432025-03-07T23:30:28.566ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110442025-03-07T23:30:28.584ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110452025-03-07T23:30:28.584ZINFOtest_unauthorized (SagaExecutor): setting state of 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 to maintenance saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
110462025-03-07T23:30:28.584ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110472025-03-07T23:30:28.584ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110482025-03-07T23:30:28.584ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110492025-03-07T23:30:28.584ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110502025-03-07T23:30:28.586ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110512025-03-07T23:30:28.590ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110522025-03-07T23:30:28.590ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110532025-03-07T23:30:28.590ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110542025-03-07T23:30:28.590ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110552025-03-07T23:30:28.594ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110562025-03-07T23:30:28.594ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110572025-03-07T23:30:28.594ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110582025-03-07T23:30:28.595ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110592025-03-07T23:30:28.599ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110602025-03-07T23:30:28.608ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110612025-03-07T23:30:28.608ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110622025-03-07T23:30:28.609ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110632025-03-07T23:30:28.609ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110642025-03-07T23:30:28.615ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110652025-03-07T23:30:28.615ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110662025-03-07T23:30:28.616ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110672025-03-07T23:30:28.619ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110682025-03-07T23:30:28.619ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110692025-03-07T23:30:28.619ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110702025-03-07T23:30:28.621ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110712025-03-07T23:30:28.621ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110722025-03-07T23:30:28.622ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110732025-03-07T23:30:28.628ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110742025-03-07T23:30:28.629ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110752025-03-07T23:30:28.629ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110762025-03-07T23:30:28.629ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110772025-03-07T23:30:28.629ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110782025-03-07T23:30:28.632ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110792025-03-07T23:30:28.632ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110802025-03-07T23:30:28.632ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110812025-03-07T23:30:28.633ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110822025-03-07T23:30:28.636ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110832025-03-07T23:30:28.636ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110842025-03-07T23:30:28.636ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110852025-03-07T23:30:28.637ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110862025-03-07T23:30:28.640ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110872025-03-07T23:30:28.649ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = AttachDiskToPantry
110882025-03-07T23:30:28.649ZDEBGtest_unauthorized (SEC): saga log event new_state = N012 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
110892025-03-07T23:30:28.649ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Number(3)) node_id = 12 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
110902025-03-07T23:30:28.652ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
110912025-03-07T23:30:28.652ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 13 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
110922025-03-07T23:30:28.655ZINFOtest_unauthorized (SagaExecutor): attaching disk 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 to pantry at [::1]:37181 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
110932025-03-07T23:30:28.655ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110942025-03-07T23:30:28.655ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110952025-03-07T23:30:28.656ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110962025-03-07T23:30:28.658ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110972025-03-07T23:30:28.658ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110982025-03-07T23:30:28.660ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
110992025-03-07T23:30:28.661ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111002025-03-07T23:30:28.661ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111012025-03-07T23:30:28.662ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111022025-03-07T23:30:28.672ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111032025-03-07T23:30:28.672ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111042025-03-07T23:30:28.672ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111052025-03-07T23:30:28.672ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111062025-03-07T23:30:28.673ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111072025-03-07T23:30:28.676ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111082025-03-07T23:30:28.676ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111092025-03-07T23:30:28.676ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111102025-03-07T23:30:28.677ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111112025-03-07T23:30:28.680ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111122025-03-07T23:30:28.680ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111132025-03-07T23:30:28.680ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111142025-03-07T23:30:28.681ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111152025-03-07T23:30:28.683ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111162025-03-07T23:30:28.693ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CallPantryAttachForDisk
111172025-03-07T23:30:28.706ZINFOtest_unauthorized (SagaExecutor): sending attach request for 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 to [::1]:37181 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
111182025-03-07T23:30:28.804ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
111192025-03-07T23:30:28.805ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 3a 85 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 :............_cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:61601 req_id = b3dc3f17-f5fa-4dc8-a33b-fea70a10e498
111202025-03-07T23:30:28.805ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 14981,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61601 req_id = b3dc3f17-f5fa-4dc8-a33b-fea70a10e498
111212025-03-07T23:30:28.805ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
111222025-03-07T23:30:28.806ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
111232025-03-07T23:30:28.806ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:61601 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal") })) }] req_id = b3dc3f17-f5fa-4dc8-a33b-fea70a10e498
111242025-03-07T23:30:28.807ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3925, tv_nsec: 354091344 } })
111252025-03-07T23:30:28.807ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
111262025-03-07T23:30:28.813ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 53 7d 01 00 00 01 00 00 00 00 00 01 24 39 37 30 S}..........$970\n0010: 66 64 62 39 31 2d 63 35 30 65 2d 34 33 37 37 2d fdb91-c50e-4377-\n0020: 38 35 37 34 2d 33 36 66 61 65 37 62 33 65 34 65 8574-36fae7b3e4e\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:63352 req_id = 2ea5dfe8-3752-42fb-a983-94af0dbbf220
111272025-03-07T23:30:28.814ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 21373,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 57,\n 55,\n 48,\n 102,\n 100,\n 98,\n 57,\n 49,\n 45,\n 99,\n 53,\n 48,\n 101,\n 45,\n 52,\n 51,\n 55,\n 55,\n 45,\n 56,\n 53,\n 55,\n 52,\n 45,\n 51,\n 54,\n 102,\n 97,\n 101,\n 55,\n 98,\n 51,\n 101,\n 52,\n 101,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63352 req_id = 2ea5dfe8-3752-42fb-a983-94af0dbbf220
111282025-03-07T23:30:28.814ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
111292025-03-07T23:30:28.814ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:63352 query = LowerQuery { name: LowerName(Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.")), original: Query { name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 2ea5dfe8-3752-42fb-a983-94af0dbbf220
111302025-03-07T23:30:28.816ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:34117 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
111312025-03-07T23:30:28.821ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = POST remote_addr = [::1]:34117 req_id = 949ad165-bc5e-44e7-b6d8-aea88097fea5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/73275cd2-2539-4bad-bf9b-1c88b1e0aa34
111322025-03-07T23:30:28.821ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 387 local_addr = [::1]:37181 method = POST remote_addr = [::1]:34117 req_id = 949ad165-bc5e-44e7-b6d8-aea88097fea5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/73275cd2-2539-4bad-bf9b-1c88b1e0aa34
111332025-03-07T23:30:28.825ZDEBGtest_unauthorized (SEC): saga log event new_state = N013 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111342025-03-07T23:30:28.825ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111352025-03-07T23:30:28.841ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111362025-03-07T23:30:28.841ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 14 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111372025-03-07T23:30:28.856ZINFOtest_unauthorized (SagaExecutor): sending snapshot request with id 5491bbba-7e49-45a0-8b6b-907587ab9704 for disk 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 to pantry endpoint http://[::1]:37181 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
111382025-03-07T23:30:28.960ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
111392025-03-07T23:30:28.965ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: fd 2a 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .*..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:54477 req_id = c7e0cf3c-eabb-4cdd-b8a0-dfe4439b7c71
111402025-03-07T23:30:28.965ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 64810,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54477 req_id = c7e0cf3c-eabb-4cdd-b8a0-dfe4439b7c71
111412025-03-07T23:30:28.965ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
111422025-03-07T23:30:28.966ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
111432025-03-07T23:30:28.967ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:54477 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal") })) }] req_id = c7e0cf3c-eabb-4cdd-b8a0-dfe4439b7c71
111442025-03-07T23:30:28.967ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3925, tv_nsec: 514590413 } })
111452025-03-07T23:30:28.968ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
111462025-03-07T23:30:28.974ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: d6 08 01 00 00 01 00 00 00 00 00 01 24 39 37 30 ............$970\n0010: 66 64 62 39 31 2d 63 35 30 65 2d 34 33 37 37 2d fdb91-c50e-4377-\n0020: 38 35 37 34 2d 33 36 66 61 65 37 62 33 65 34 65 8574-36fae7b3e4e\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:62834 req_id = b94e689a-9f55-499e-88f7-f3a1691c7113
111472025-03-07T23:30:28.975ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54792,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 57,\n 55,\n 48,\n 102,\n 100,\n 98,\n 57,\n 49,\n 45,\n 99,\n 53,\n 48,\n 101,\n 45,\n 52,\n 51,\n 55,\n 55,\n 45,\n 56,\n 53,\n 55,\n 52,\n 45,\n 51,\n 54,\n 102,\n 97,\n 101,\n 55,\n 98,\n 51,\n 101,\n 52,\n 101,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62834 req_id = b94e689a-9f55-499e-88f7-f3a1691c7113
111482025-03-07T23:30:28.975ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
111492025-03-07T23:30:28.975ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62834 query = LowerQuery { name: LowerName(Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.")), original: Query { name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = b94e689a-9f55-499e-88f7-f3a1691c7113
111502025-03-07T23:30:28.981ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:43873 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
111512025-03-07T23:30:28.982ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = POST remote_addr = [::1]:43873 req_id = 85fc65a0-18a6-451b-a0cb-3aa04d26cb54 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/73275cd2-2539-4bad-bf9b-1c88b1e0aa34/snapshot
111522025-03-07T23:30:28.982ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): mapped vcr with id 73275cd2-2539-4bad-bf9b-1c88b1e0aa34
111532025-03-07T23:30:28.982ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): found region region_id = 04f562df-dec8-41e2-b074-39178787c4ac sled_id = b6d65341-167c-41df-9b5c-41cded99c229 snapshot_id = 5491bbba-7e49-45a0-8b6b-907587ab9704
111542025-03-07T23:30:28.982ZINFOtest_unauthorized (SledAgent): creating region 04f562df-dec8-41e2-b074-39178787c4ac snapshot 5491bbba-7e49-45a0-8b6b-907587ab9704 end_port = 1100 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1050
111552025-03-07T23:30:28.982ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): found region region_id = 741ff649-473a-4388-9d23-76690a400f66 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 snapshot_id = 5491bbba-7e49-45a0-8b6b-907587ab9704
111562025-03-07T23:30:28.982ZINFOtest_unauthorized (SledAgent): creating region 741ff649-473a-4388-9d23-76690a400f66 snapshot 5491bbba-7e49-45a0-8b6b-907587ab9704 end_port = 1050 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1000
111572025-03-07T23:30:28.982ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): found region region_id = 2f6a275c-2a15-4e29-b1f5-1396e4e98387 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 snapshot_id = 5491bbba-7e49-45a0-8b6b-907587ab9704
111582025-03-07T23:30:28.982ZINFOtest_unauthorized (SledAgent): creating region 2f6a275c-2a15-4e29-b1f5-1396e4e98387 snapshot 5491bbba-7e49-45a0-8b6b-907587ab9704 end_port = 1200 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_port = 1150
111592025-03-07T23:30:28.982ZINFOtest_unauthorized (omicron_sled_agent::sim::SimulatedUpstairs): successfully created snapshot 5491bbba-7e49-45a0-8b6b-907587ab9704
111602025-03-07T23:30:28.982ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 633 local_addr = [::1]:37181 method = POST remote_addr = [::1]:43873 req_id = 85fc65a0-18a6-451b-a0cb-3aa04d26cb54 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/73275cd2-2539-4bad-bf9b-1c88b1e0aa34/snapshot
111612025-03-07T23:30:28.984ZDEBGtest_unauthorized (SEC): saga log event new_state = N014 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111622025-03-07T23:30:28.984ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111632025-03-07T23:30:28.991ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111642025-03-07T23:30:28.991ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 15 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111652025-03-07T23:30:29.001ZINFOtest_unauthorized (SagaExecutor): detaching disk 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 from pantry at [::1]:37181 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
111662025-03-07T23:30:29.001ZINFOtest_unauthorized (SagaExecutor): sending detach for 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 to endpoint http://[::1]:37181 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
111672025-03-07T23:30:29.129ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal
111682025-03-07T23:30:29.130ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 4b 2e 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 K............_cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:65423 req_id = 41eccb98-8e91-4dd3-bcff-84aeb6dfa3ce
111692025-03-07T23:30:29.131ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 19246,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:65423 req_id = 41eccb98-8e91-4dd3-bcff-84aeb6dfa3ce
111702025-03-07T23:30:29.131ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
111712025-03-07T23:30:29.131ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
111722025-03-07T23:30:29.131ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:65423 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal") })) }] req_id = 41eccb98-8e91-4dd3-bcff-84aeb6dfa3ce
111732025-03-07T23:30:29.131ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _crucible-pantry._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3925, tv_nsec: 678785761 } })
111742025-03-07T23:30:29.131ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
111752025-03-07T23:30:29.132ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 46 a4 01 00 00 01 00 00 00 00 00 01 24 39 37 30 F...........$970\n0010: 66 64 62 39 31 2d 63 35 30 65 2d 34 33 37 37 2d fdb91-c50e-4377-\n0020: 38 35 37 34 2d 33 36 66 61 65 37 62 33 65 34 65 8574-36fae7b3e4e\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:64872 req_id = abd82f66-63e2-4124-89d4-1e6567037731
111762025-03-07T23:30:29.132ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 18084,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 57,\n 55,\n 48,\n 102,\n 100,\n 98,\n 57,\n 49,\n 45,\n 99,\n 53,\n 48,\n 101,\n 45,\n 52,\n 51,\n 55,\n 55,\n 45,\n 56,\n 53,\n 55,\n 52,\n 45,\n 51,\n 54,\n 102,\n 97,\n 101,\n 55,\n 98,\n 51,\n 101,\n 52,\n 101,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64872 req_id = abd82f66-63e2-4124-89d4-1e6567037731
111772025-03-07T23:30:29.132ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
111782025-03-07T23:30:29.132ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:64872 query = LowerQuery { name: LowerName(Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.")), original: Query { name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = abd82f66-63e2-4124-89d4-1e6567037731
111792025-03-07T23:30:29.133ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:54926 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
111802025-03-07T23:30:29.133ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = DELETE remote_addr = [::1]:54926 req_id = af2f2334-1cb7-46e5-956d-63fa375dd70f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/73275cd2-2539-4bad-bf9b-1c88b1e0aa34
111812025-03-07T23:30:29.133ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 281 local_addr = [::1]:37181 method = DELETE remote_addr = [::1]:54926 req_id = af2f2334-1cb7-46e5-956d-63fa375dd70f response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0/volume/73275cd2-2539-4bad-bf9b-1c88b1e0aa34
111822025-03-07T23:30:29.143ZDEBGtest_unauthorized (SEC): saga log event new_state = N015 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111832025-03-07T23:30:29.143ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 15 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111842025-03-07T23:30:29.149ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111852025-03-07T23:30:29.149ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 16 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111862025-03-07T23:30:29.152ZDEBGtest_unauthorized (SEC): saga log event new_state = N016 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111872025-03-07T23:30:29.152ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111882025-03-07T23:30:29.154ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
111892025-03-07T23:30:29.154ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 17 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
111902025-03-07T23:30:29.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
111912025-03-07T23:30:29.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
111922025-03-07T23:30:29.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
111932025-03-07T23:30:29.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
111942025-03-07T23:30:29.158ZINFOtest_unauthorized (SagaExecutor): starting running snapshot saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot_id = 5491bbba-7e49-45a0-8b6b-907587ab9704
111952025-03-07T23:30:29.158ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
111962025-03-07T23:30:29.158ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
111972025-03-07T23:30:29.160ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
111982025-03-07T23:30:29.162ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
111992025-03-07T23:30:29.162ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112002025-03-07T23:30:29.163ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112012025-03-07T23:30:29.164ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
112022025-03-07T23:30:29.164ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
112032025-03-07T23:30:29.167ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112042025-03-07T23:30:29.167ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112052025-03-07T23:30:29.167ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112062025-03-07T23:30:29.169ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
112072025-03-07T23:30:29.169ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
112082025-03-07T23:30:29.169ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112092025-03-07T23:30:29.169ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112102025-03-07T23:30:29.169ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112112025-03-07T23:30:29.169ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112122025-03-07T23:30:29.170ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112132025-03-07T23:30:29.173ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112142025-03-07T23:30:29.173ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112152025-03-07T23:30:29.173ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112162025-03-07T23:30:29.173ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112172025-03-07T23:30:29.176ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112182025-03-07T23:30:29.177ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112192025-03-07T23:30:29.177ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112202025-03-07T23:30:29.177ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112212025-03-07T23:30:29.180ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112222025-03-07T23:30:29.190ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = StartRunningSnapshot
112232025-03-07T23:30:29.197ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm region exists dataset = 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset) region = 04f562df-dec8-41e2-b074-39178787c4ac saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112242025-03-07T23:30:29.202ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:47503 method = GET remote_addr = [::1]:39737 req_id = 132f36f8-2582-4fa0-8bd5-fccc853c43a9 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/04f562df-dec8-41e2-b074-39178787c4ac
112252025-03-07T23:30:29.203ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 639 local_addr = [::1]:47503 method = GET remote_addr = [::1]:39737 req_id = 132f36f8-2582-4fa0-8bd5-fccc853c43a9 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/04f562df-dec8-41e2-b074-39178787c4ac
112262025-03-07T23:30:29.203ZINFOtest_unauthorized (SagaExecutor): confirmed the region exists dataset = 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset) region = Region { block_size: 4096, cert_pem: None, encrypted: false, extent_count: 32, extent_size: 16384, id: RegionId("04f562df-dec8-41e2-b074-39178787c4ac"), key_pem: None, port_number: 1050, read_only: false, root_pem: None, source: None, state: Created } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112272025-03-07T23:30:29.204ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm snapshot exists dataset = 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset) region = 04f562df-dec8-41e2-b074-39178787c4ac saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot = 5491bbba-7e49-45a0-8b6b-907587ab9704
112282025-03-07T23:30:29.213ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:47503 method = GET remote_addr = [::1]:39737 req_id = 0ee9c3bc-114d-4968-9ab4-63fed24f9e30 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/04f562df-dec8-41e2-b074-39178787c4ac/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704
112292025-03-07T23:30:29.214ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 618 local_addr = [::1]:47503 method = GET remote_addr = [::1]:39737 req_id = 0ee9c3bc-114d-4968-9ab4-63fed24f9e30 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/04f562df-dec8-41e2-b074-39178787c4ac/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704
112302025-03-07T23:30:29.215ZINFOtest_unauthorized (SagaExecutor): confirmed the snapshot exists dataset = 0eadcbf4-64c5-429c-bd1b-5e784f8bb804 (dataset) region = RegionId("04f562df-dec8-41e2-b074-39178787c4ac") saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot = Snapshot { created: 2025-03-07T23:30:28.982825180Z, name: "5491bbba-7e49-45a0-8b6b-907587ab9704" }
112312025-03-07T23:30:29.229ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:47503 method = POST remote_addr = [::1]:39737 req_id = 072dd2f8-01a3-4ecb-b624-8b9d6f4010a9 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/04f562df-dec8-41e2-b074-39178787c4ac/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704/run
112322025-03-07T23:30:29.229ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 416 local_addr = [::1]:47503 method = POST remote_addr = [::1]:39737 req_id = 072dd2f8-01a3-4ecb-b624-8b9d6f4010a9 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/04f562df-dec8-41e2-b074-39178787c4ac/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704/run
112332025-03-07T23:30:29.230ZINFOtest_unauthorized (SagaExecutor): successfully started running region snapshot running snapshot = RunningSnapshot { id: RegionId("db092cc6-9492-4511-ba88-78f69cbd6265"), name: "5491bbba-7e49-45a0-8b6b-907587ab9704", port_number: 1052, state: Created } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112342025-03-07T23:30:29.230ZINFOtest_unauthorized (SagaExecutor): map [::1]:1050 to [::1]:1052 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112352025-03-07T23:30:29.236ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm region exists dataset = 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset) region = 741ff649-473a-4388-9d23-76690a400f66 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112362025-03-07T23:30:29.261ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
112372025-03-07T23:30:29.272ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36988 method = GET remote_addr = [::1]:57120 req_id = 5bf65214-49f5-4f28-9103-2f40bd5e3a73 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/741ff649-473a-4388-9d23-76690a400f66
112382025-03-07T23:30:29.273ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 538 local_addr = [::1]:36988 method = GET remote_addr = [::1]:57120 req_id = 5bf65214-49f5-4f28-9103-2f40bd5e3a73 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/741ff649-473a-4388-9d23-76690a400f66
112392025-03-07T23:30:29.273ZINFOtest_unauthorized (SagaExecutor): confirmed the region exists dataset = 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset) region = Region { block_size: 4096, cert_pem: None, encrypted: false, extent_count: 32, extent_size: 16384, id: RegionId("741ff649-473a-4388-9d23-76690a400f66"), key_pem: None, port_number: 1000, read_only: false, root_pem: None, source: None, state: Created } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112402025-03-07T23:30:29.273ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm snapshot exists dataset = 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset) region = 741ff649-473a-4388-9d23-76690a400f66 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot = 5491bbba-7e49-45a0-8b6b-907587ab9704
112412025-03-07T23:30:29.279ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36988 method = GET remote_addr = [::1]:57120 req_id = db0d395a-d2c6-443b-9050-0e570dcf0a5a server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/741ff649-473a-4388-9d23-76690a400f66/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704
112422025-03-07T23:30:29.279ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 434 local_addr = [::1]:36988 method = GET remote_addr = [::1]:57120 req_id = db0d395a-d2c6-443b-9050-0e570dcf0a5a response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/741ff649-473a-4388-9d23-76690a400f66/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704
112432025-03-07T23:30:29.280ZINFOtest_unauthorized (SagaExecutor): confirmed the snapshot exists dataset = 8997fdce-093d-4d30-a82e-270a30ca78a7 (dataset) region = RegionId("741ff649-473a-4388-9d23-76690a400f66") saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot = Snapshot { created: 2025-03-07T23:30:28.982859950Z, name: "5491bbba-7e49-45a0-8b6b-907587ab9704" }
112442025-03-07T23:30:29.286ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = 71933775-dbb2-4154-b066-41c6e8a8c783 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/741ff649-473a-4388-9d23-76690a400f66/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704/run
112452025-03-07T23:30:29.287ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 1001 local_addr = [::1]:36988 method = POST remote_addr = [::1]:57120 req_id = 71933775-dbb2-4154-b066-41c6e8a8c783 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/741ff649-473a-4388-9d23-76690a400f66/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704/run
112462025-03-07T23:30:29.288ZINFOtest_unauthorized (SagaExecutor): successfully started running region snapshot running snapshot = RunningSnapshot { id: RegionId("2b871a19-c13f-4868-af04-59e7ab178548"), name: "5491bbba-7e49-45a0-8b6b-907587ab9704", port_number: 1003, state: Created } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112472025-03-07T23:30:29.288ZINFOtest_unauthorized (SagaExecutor): map [::1]:1000 to [::1]:1003 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112482025-03-07T23:30:29.293ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm region exists dataset = c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset) region = 2f6a275c-2a15-4e29-b1f5-1396e4e98387 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112492025-03-07T23:30:29.315ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:63315 method = GET remote_addr = [::1]:44471 req_id = eafd6540-2168-426f-858a-5b7964744f78 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/2f6a275c-2a15-4e29-b1f5-1396e4e98387
112502025-03-07T23:30:29.315ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 273 local_addr = [::1]:63315 method = GET remote_addr = [::1]:44471 req_id = eafd6540-2168-426f-858a-5b7964744f78 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/2f6a275c-2a15-4e29-b1f5-1396e4e98387
112512025-03-07T23:30:29.315ZINFOtest_unauthorized (SagaExecutor): confirmed the region exists dataset = c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset) region = Region { block_size: 4096, cert_pem: None, encrypted: false, extent_count: 32, extent_size: 16384, id: RegionId("2f6a275c-2a15-4e29-b1f5-1396e4e98387"), key_pem: None, port_number: 1150, read_only: false, root_pem: None, source: None, state: Created } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112522025-03-07T23:30:29.315ZINFOtest_unauthorized (SagaExecutor): contacting crucible agent to confirm snapshot exists dataset = c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset) region = 2f6a275c-2a15-4e29-b1f5-1396e4e98387 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot = 5491bbba-7e49-45a0-8b6b-907587ab9704
112532025-03-07T23:30:29.324ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:63315 method = GET remote_addr = [::1]:44471 req_id = 743fea28-593c-4e95-ab6d-0610e83a54f1 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/2f6a275c-2a15-4e29-b1f5-1396e4e98387/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704
112542025-03-07T23:30:29.324ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 263 local_addr = [::1]:63315 method = GET remote_addr = [::1]:44471 req_id = 743fea28-593c-4e95-ab6d-0610e83a54f1 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/2f6a275c-2a15-4e29-b1f5-1396e4e98387/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704
112552025-03-07T23:30:29.324ZINFOtest_unauthorized (SagaExecutor): confirmed the snapshot exists dataset = c72dc617-1d95-43e9-a071-ee0a42863c38 (dataset) region = RegionId("2f6a275c-2a15-4e29-b1f5-1396e4e98387") saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create snapshot = Snapshot { created: 2025-03-07T23:30:28.982882747Z, name: "5491bbba-7e49-45a0-8b6b-907587ab9704" }
112562025-03-07T23:30:29.330ZTRACtest_unauthorized (Simulated CrucibleAgent Dropshot Server): incoming request kind = storage local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = b9a30206-c09e-4e56-8232-25f4f7e7d557 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/2f6a275c-2a15-4e29-b1f5-1396e4e98387/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704/run
112572025-03-07T23:30:29.330ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): request completed kind = storage latency_us = 231 local_addr = [::1]:63315 method = POST remote_addr = [::1]:44471 req_id = b9a30206-c09e-4e56-8232-25f4f7e7d557 response_code = 200 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/0/regions/2f6a275c-2a15-4e29-b1f5-1396e4e98387/snapshots/5491bbba-7e49-45a0-8b6b-907587ab9704/run
112582025-03-07T23:30:29.331ZINFOtest_unauthorized (SagaExecutor): successfully started running region snapshot running snapshot = RunningSnapshot { id: RegionId("26f518a9-08b2-42d0-b844-fa5055d2afb3"), name: "5491bbba-7e49-45a0-8b6b-907587ab9704", port_number: 1153, state: Created } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112592025-03-07T23:30:29.331ZINFOtest_unauthorized (SagaExecutor): map [::1]:1150 to [::1]:1153 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112602025-03-07T23:30:29.335ZDEBGtest_unauthorized (SEC): saga log event new_state = N017 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
112612025-03-07T23:30:29.335ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"[::1]:1000": String("[::1]:1003"), "[::1]:1050": String("[::1]:1052"), "[::1]:1150": String("[::1]:1153")}) node_id = 17 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
112622025-03-07T23:30:29.342ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
112632025-03-07T23:30:29.342ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 18 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
112642025-03-07T23:30:29.345ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112652025-03-07T23:30:29.346ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112662025-03-07T23:30:29.347ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112672025-03-07T23:30:29.350ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112682025-03-07T23:30:29.350ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112692025-03-07T23:30:29.353ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112702025-03-07T23:30:29.357ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112712025-03-07T23:30:29.358ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112722025-03-07T23:30:29.360ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112732025-03-07T23:30:29.363ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112742025-03-07T23:30:29.363ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112752025-03-07T23:30:29.363ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112762025-03-07T23:30:29.363ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112772025-03-07T23:30:29.364ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112782025-03-07T23:30:29.368ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112792025-03-07T23:30:29.368ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112802025-03-07T23:30:29.370ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112812025-03-07T23:30:29.371ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112822025-03-07T23:30:29.375ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112832025-03-07T23:30:29.375ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112842025-03-07T23:30:29.375ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112852025-03-07T23:30:29.377ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112862025-03-07T23:30:29.380ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112872025-03-07T23:30:29.393ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = CreateVolumeRecord
112882025-03-07T23:30:29.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
112892025-03-07T23:30:29.411ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112902025-03-07T23:30:29.412ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a2edcc48-1d6f-4de8-9199-9463b7987148 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112912025-03-07T23:30:29.413ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a2edcc48-1d6f-4de8-9199-9463b7987148 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112922025-03-07T23:30:29.414ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a2edcc48-1d6f-4de8-9199-9463b7987148 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112932025-03-07T23:30:29.414ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a2edcc48-1d6f-4de8-9199-9463b7987148 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112942025-03-07T23:30:29.415ZINFOtest_unauthorized (SagaExecutor): disk volume construction request {"type":"volume","id":"73275cd2-2539-4bad-bf9b-1c88b1e0aa34","block_size":4096,"sub_volumes":[{"type":"region","block_size":4096,"blocks_per_extent":16384,"extent_count":32,"opts":{"id":"73275cd2-2539-4bad-bf9b-1c88b1e0aa34","target":["[::1]:1050","[::1]:1000","[::1]:1150"],"lossy":false,"flush_timeout":null,"key":"aHRvBtSrmX+Ss8jDrwCsC1upoqbnvRZ3qSDS00uAEhw=","cert_pem":null,"key_pem":null,"root_cert_pem":null,"control":null,"read_only":false},"gen":2}],"read_only_parent":null} saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112952025-03-07T23:30:29.415ZINFOtest_unauthorized (SagaExecutor): snapshot volume construction request Volume { id: 67fe487f-d5b9-4672-b6c3-62b14f35b97b, block_size: 4096, sub_volumes: [Region { block_size: 4096, blocks_per_extent: 16384, extent_count: 32, opts: CrucibleOpts { id: 03da05a8-84b6-49dc-8d81-74c6dde22f5d, target: [[::1]:1052, [::1]:1003, [::1]:1153], lossy: false, flush_timeout: None, key: Some("aHRvBtSrmX+Ss8jDrwCsC1upoqbnvRZ3qSDS00uAEhw="), cert_pem: None, key_pem: None, root_cert_pem: None, control: None, read_only: true }, gen: 2 }], read_only_parent: None } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
112962025-03-07T23:30:29.420ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7934 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a2edcc48-1d6f-4de8-9199-9463b7987148 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
112972025-03-07T23:30:29.422ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "a2edcc48-1d6f-4de8-9199-9463b7987148", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:28 GMT"} })
112982025-03-07T23:30:29.423ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
112992025-03-07T23:30:29.425ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e542229c-7a21-4615-8ca5-76a1ab4da47d uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
113002025-03-07T23:30:29.426ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e542229c-7a21-4615-8ca5-76a1ab4da47d resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
113012025-03-07T23:30:29.426ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e542229c-7a21-4615-8ca5-76a1ab4da47d roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
113022025-03-07T23:30:29.427ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e542229c-7a21-4615-8ca5-76a1ab4da47d resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
113032025-03-07T23:30:29.430ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4966 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e542229c-7a21-4615-8ca5-76a1ab4da47d response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
113042025-03-07T23:30:29.431ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e542229c-7a21-4615-8ca5-76a1ab4da47d", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:28 GMT"} })
113052025-03-07T23:30:29.431ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
113062025-03-07T23:30:29.433ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113072025-03-07T23:30:29.433ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
113082025-03-07T23:30:29.493ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
113092025-03-07T23:30:29.494ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
113102025-03-07T23:30:29.494ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
113112025-03-07T23:30:29.532ZINFOtest_unauthorized (SagaExecutor): volume 1d7d51e2-323d-49fa-ad13-f0513202928a created ok saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
113122025-03-07T23:30:29.532ZDEBGtest_unauthorized (SEC): saga log event new_state = N018 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
113132025-03-07T23:30:29.532ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
113142025-03-07T23:30:29.548ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
113152025-03-07T23:30:29.548ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 19 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
113162025-03-07T23:30:29.551ZINFOtest_unauthorized (SagaExecutor): snapshot final lookup... saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
113172025-03-07T23:30:29.551ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113182025-03-07T23:30:29.551ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113192025-03-07T23:30:29.552ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113202025-03-07T23:30:29.556ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113212025-03-07T23:30:29.556ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113222025-03-07T23:30:29.558ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113232025-03-07T23:30:29.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113242025-03-07T23:30:29.561ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113252025-03-07T23:30:29.562ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113262025-03-07T23:30:29.562ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113272025-03-07T23:30:29.575ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113282025-03-07T23:30:29.579ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ById(5491bbba-7e49-45a0-8b6b-907587ab9704) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113292025-03-07T23:30:29.580ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113302025-03-07T23:30:29.580ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113312025-03-07T23:30:29.580ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113322025-03-07T23:30:29.580ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113332025-03-07T23:30:29.581ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113342025-03-07T23:30:29.582ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113352025-03-07T23:30:29.582ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113362025-03-07T23:30:29.582ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
113372025-03-07T23:30:29.585ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113382025-03-07T23:30:29.585ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113392025-03-07T23:30:29.586ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113402025-03-07T23:30:29.587ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113412025-03-07T23:30:29.592ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113422025-03-07T23:30:29.592ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113432025-03-07T23:30:29.592ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113442025-03-07T23:30:29.594ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113452025-03-07T23:30:29.598ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113462025-03-07T23:30:29.610ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ById(5491bbba-7e49-45a0-8b6b-907587ab9704) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113472025-03-07T23:30:29.611ZINFOtest_unauthorized (SagaExecutor): snapshot final lookup ok saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
113482025-03-07T23:30:29.611ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ById(5491bbba-7e49-45a0-8b6b-907587ab9704) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113492025-03-07T23:30:29.611ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113502025-03-07T23:30:29.611ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113512025-03-07T23:30:29.611ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113522025-03-07T23:30:29.612ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113532025-03-07T23:30:29.616ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113542025-03-07T23:30:29.616ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113552025-03-07T23:30:29.616ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113562025-03-07T23:30:29.617ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113572025-03-07T23:30:29.621ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113582025-03-07T23:30:29.621ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113592025-03-07T23:30:29.621ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113602025-03-07T23:30:29.622ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113612025-03-07T23:30:29.625ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113622025-03-07T23:30:29.640ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ById(5491bbba-7e49-45a0-8b6b-907587ab9704) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113632025-03-07T23:30:29.640ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113642025-03-07T23:30:29.640ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113652025-03-07T23:30:29.640ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = FinalizeSnapshotRecord
113662025-03-07T23:30:29.641ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
113672025-03-07T23:30:29.642ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
113682025-03-07T23:30:29.642ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
113692025-03-07T23:30:29.646ZINFOtest_unauthorized (SagaExecutor): snapshot finalized! saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
113702025-03-07T23:30:29.647ZDEBGtest_unauthorized (SEC): saga log event new_state = N019 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
113712025-03-07T23:30:29.647ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "gen": Number(2), "identity": Object {"description": String(""), "id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:30:28.233177Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:28.233177Z")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "size": Number(2147483648), "state": String("Ready"), "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a")}) node_id = 19 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
113722025-03-07T23:30:29.651ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
113732025-03-07T23:30:29.651ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 20 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
113742025-03-07T23:30:29.656ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113752025-03-07T23:30:29.656ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113762025-03-07T23:30:29.658ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113772025-03-07T23:30:29.661ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113782025-03-07T23:30:29.662ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113792025-03-07T23:30:29.662ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113802025-03-07T23:30:29.666ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113812025-03-07T23:30:29.666ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113822025-03-07T23:30:29.668ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113832025-03-07T23:30:29.670ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113842025-03-07T23:30:29.670ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113852025-03-07T23:30:29.670ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113862025-03-07T23:30:29.670ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113872025-03-07T23:30:29.671ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113882025-03-07T23:30:29.674ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113892025-03-07T23:30:29.674ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113902025-03-07T23:30:29.674ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113912025-03-07T23:30:29.675ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113922025-03-07T23:30:29.679ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113932025-03-07T23:30:29.679ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113942025-03-07T23:30:29.679ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113952025-03-07T23:30:29.680ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113962025-03-07T23:30:29.683ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113972025-03-07T23:30:29.699ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
113982025-03-07T23:30:29.699ZINFOtest_unauthorized (SagaExecutor): setting disk 73275cd2-2539-4bad-bf9b-1c88b1e0aa34 state from maintenance to detached saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create
113992025-03-07T23:30:29.699ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114002025-03-07T23:30:29.699ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114012025-03-07T23:30:29.699ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114022025-03-07T23:30:29.699ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114032025-03-07T23:30:29.700ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114042025-03-07T23:30:29.703ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114052025-03-07T23:30:29.703ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114062025-03-07T23:30:29.704ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114072025-03-07T23:30:29.704ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114082025-03-07T23:30:29.708ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114092025-03-07T23:30:29.708ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114102025-03-07T23:30:29.708ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114112025-03-07T23:30:29.708ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114122025-03-07T23:30:29.719ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114132025-03-07T23:30:29.738ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114142025-03-07T23:30:29.739ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114152025-03-07T23:30:29.739ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114162025-03-07T23:30:29.741ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = DetachDiskFromPantry
114172025-03-07T23:30:29.749ZDEBGtest_unauthorized (SEC): saga log event new_state = N020 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114182025-03-07T23:30:29.749ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
114192025-03-07T23:30:29.757ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114202025-03-07T23:30:29.757ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 21 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
114212025-03-07T23:30:29.768ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114222025-03-07T23:30:29.769ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114232025-03-07T23:30:29.770ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114242025-03-07T23:30:29.778ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114252025-03-07T23:30:29.779ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114262025-03-07T23:30:29.780ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114272025-03-07T23:30:29.794ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114282025-03-07T23:30:29.794ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114292025-03-07T23:30:29.796ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114302025-03-07T23:30:29.809ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114312025-03-07T23:30:29.809ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114322025-03-07T23:30:29.809ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114332025-03-07T23:30:29.809ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114342025-03-07T23:30:29.810ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114352025-03-07T23:30:29.815ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114362025-03-07T23:30:29.815ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114372025-03-07T23:30:29.815ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114382025-03-07T23:30:29.817ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114392025-03-07T23:30:29.821ZTRACtest_unauthorized (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114402025-03-07T23:30:29.821ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114412025-03-07T23:30:29.821ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114422025-03-07T23:30:29.821ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114432025-03-07T23:30:29.826ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114442025-03-07T23:30:29.846ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ById(581ba6bb-1990-42cd-9dc5-6371c2e527c7) }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ById(73275cd2-2539-4bad-bf9b-1c88b1e0aa34) } result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114452025-03-07T23:30:29.846ZTRACtest_unauthorized (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114462025-03-07T23:30:29.847ZDEBGtest_unauthorized (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114472025-03-07T23:30:29.849ZDEBGtest_unauthorized (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_node = ReleaseVolumeLock
114482025-03-07T23:30:29.855ZDEBGtest_unauthorized (SEC): saga log event new_state = N021 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114492025-03-07T23:30:29.855ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
114502025-03-07T23:30:29.862ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 started sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114512025-03-07T23:30:29.862ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Started node_id = 23 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
114522025-03-07T23:30:29.867ZDEBGtest_unauthorized (SEC): saga log event new_state = N023 succeeded sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114532025-03-07T23:30:29.867ZDEBGtest_unauthorized (SecStore): recording saga event event_type = Succeeded(Null) node_id = 23 saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
114542025-03-07T23:30:29.872ZINFOtest_unauthorized (SEC): update for saga cached state new_state = Done saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114552025-03-07T23:30:29.872ZINFOtest_unauthorized (SecStore): updating state new_state = done saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c
114562025-03-07T23:30:29.879ZINFOtest_unauthorized (SEC): saga finished result = success saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create sec_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
114572025-03-07T23:30:29.880ZINFOtest_unauthorized (SagaExecutor): saga finished saga_id = a58d2b99-d610-4ff4-b58d-8ea56d5d719c saga_name = snapshot-create saga_result = SagaResult { saga_id: a58d2b99-d610-4ff4-b58d-8ea56d5d719c, saga_log: SagaLog { saga_id: a58d2b99-d610-4ff4-b58d-8ea56d5d719c, unwinding: false, events: [N022 started, N022 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N023 started, N023 succeeded], node_status: {0: Succeeded(String("5491bbba-7e49-45a0-8b6b-907587ab9704")), 1: Succeeded(String("1d7d51e2-323d-49fa-ad13-f0513202928a")), 2: Succeeded(String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")), 3: Succeeded(String("e455df99-d8fc-4215-97ae-43ae7bf53ad1")), 4: Succeeded(Null), 5: Succeeded(Array [Array [Object {"identity": Object {"id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "time_created": String("2025-03-07T23:30:05.411623Z"), "time_modified": String("2025-03-07T23:30:05.411623Z")}, "ip": String("::1"), "pool_id": String("9dcb348c-3741-440e-ad18-bffcbe7ca303"), "port": Number(47503), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("7d1f4a23-9f5e-4a2b-b998-64b66e94b03d"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}], Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("5d407922-28af-44a9-8ce6-ebfd42695d7d"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("36969eea-7179-4dd5-a47b-72cc57ded900"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}]]), 6: Succeeded(Null), 7: Succeeded(Object {"block_size": Number(4096), "id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "key": String("ybEcajyae4lHmB/8mlZsJBW/1hVf9+Xe1r8u97CmpEk="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1002"), String("[::1]:1051"), String("[::1]:1152")]}, "type": String("region")}], "type": String("volume")}), 8: Succeeded(Null), 9: Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "gen": Number(1), "identity": Object {"description": String(""), "id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:30:28.233177Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:28.233177Z")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "size": Number(2147483648), "state": String("Creating"), "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a")}), 10: Succeeded(Null), 11: Succeeded(Array [String("[::1]:37181"), Bool(false)]), 12: Succeeded(Number(3)), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Null), 16: Succeeded(Null), 17: Succeeded(Object {"[::1]:1000": String("[::1]:1003"), "[::1]:1050": String("[::1]:1052"), "[::1]:1150": String("[::1]:1153")}), 18: Succeeded(Null), 19: Succeeded(Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "gen": Number(2), "identity": Object {"description": String(""), "id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:30:28.233177Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:28.233177Z")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "size": Number(2147483648), "state": String("Ready"), "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a")}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"call_pantry_attach_for_disk": Null, "call_pantry_detach_for_disk": Null, "call_pantry_snapshot_for_disk": Null, "created_destination_volume": Null, "created_snapshot": Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "gen": Number(1), "identity": Object {"description": String(""), "id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:30:28.233177Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:28.233177Z")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "size": Number(2147483648), "state": String("Creating"), "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a")}, "created_volume": Null, "datasets_and_regions": Array [Array [Object {"identity": Object {"id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "time_created": String("2025-03-07T23:30:05.411623Z"), "time_modified": String("2025-03-07T23:30:05.411623Z")}, "ip": String("::1"), "pool_id": String("9dcb348c-3741-440e-ad18-bffcbe7ca303"), "port": Number(47503), "rcgen": Number(1), "size_used": Number(4294967296), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("0eadcbf4-64c5-429c-bd1b-5e784f8bb804"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("7d1f4a23-9f5e-4a2b-b998-64b66e94b03d"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}], Array [Object {"identity": Object {"id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "time_created": String("2025-03-07T23:30:03.742942Z"), "time_modified": String("2025-03-07T23:30:03.742942Z")}, "ip": String("::1"), "pool_id": String("72fa80df-1134-4c26-8f56-47af05a6836f"), "port": Number(36988), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("8997fdce-093d-4d30-a82e-270a30ca78a7"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("5d407922-28af-44a9-8ce6-ebfd42695d7d"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}], Array [Object {"identity": Object {"id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "time_created": String("2025-03-07T23:30:07.282286Z"), "time_modified": String("2025-03-07T23:30:07.282286Z")}, "ip": String("::1"), "pool_id": String("3fa24f8b-aa49-4c5c-8ef8-1ed98421fb4f"), "port": Number(63315), "rcgen": Number(1), "size_used": Number(6442450944), "time_deleted": Null}, Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "dataset_id": String("c72dc617-1d95-43e9-a071-ee0a42863c38"), "deleting": Bool(false), "extent_count": Number(32), "identity": Object {"id": String("36969eea-7179-4dd5-a47b-72cc57ded900"), "time_created": String("2025-03-07T23:30:28.053987Z"), "time_modified": String("2025-03-07T23:30:28.053987Z")}, "port": Null, "read_only": Bool(false), "volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8")}]], "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "detach_disk_from_pantry": Null, "disk_generation_number": Number(3), "finalized_snapshot": Object {"block_size": String("AdvancedFormat"), "destination_volume_id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "disk_id": String("73275cd2-2539-4bad-bf9b-1c88b1e0aa34"), "gen": Number(2), "identity": Object {"description": String(""), "id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "name": String("demo-snapshot"), "time_created": String("2025-03-07T23:30:28.233177Z"), "time_deleted": Null, "time_modified": String("2025-03-07T23:30:28.233177Z")}, "project_id": String("581ba6bb-1990-42cd-9dc5-6371c2e527c7"), "size": Number(2147483648), "state": String("Ready"), "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a")}, "lock_id": String("e455df99-d8fc-4215-97ae-43ae7bf53ad1"), "no_result": Null, "pantry_address": Array [String("[::1]:37181"), Bool(false)], "regions_ensure": Object {"block_size": Number(4096), "id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "read_only_parent": Null, "sub_volumes": Array [Object {"block_size": Number(4096), "blocks_per_extent": Number(16384), "extent_count": Number(32), "gen": Number(1), "opts": Object {"cert_pem": Null, "control": Null, "flush_timeout": Null, "id": String("17893f46-5efa-4924-8ce8-e96bbf4e22e8"), "key": String("ybEcajyae4lHmB/8mlZsJBW/1hVf9+Xe1r8u97CmpEk="), "key_pem": Null, "lossy": Bool(false), "read_only": Bool(false), "root_cert_pem": Null, "target": Array [String("[::1]:1002"), String("[::1]:1051"), String("[::1]:1152")]}, "type": String("region")}], "type": String("volume")}, "regions_ensure_undo": Null, "replace_sockets_map": Object {"[::1]:1000": String("[::1]:1003"), "[::1]:1050": String("[::1]:1052"), "[::1]:1150": String("[::1]:1153")}, "snapshot_id": String("5491bbba-7e49-45a0-8b6b-907587ab9704"), "ssc_not_used": Null, "volume_id": String("1d7d51e2-323d-49fa-ad13-f0513202928a"), "volume_lock": Null, "volume_unlock": Null} }) }
114582025-03-07T23:30:29.880ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 2300161 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7b3a7cbb-722c-474f-923e-0e9447d860e5 response_code = 201 uri = /v1/snapshots?project=demo-project
114592025-03-07T23:30:29.880ZINFOtest_unauthorized (external client test context): client received response status = 201
114602025-03-07T23:30:29.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images?project=demo-project
114612025-03-07T23:30:29.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 uri = /v1/images?project=demo-project
114622025-03-07T23:30:29.881ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 uri = /v1/images?project=demo-project
114632025-03-07T23:30:29.881ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images?project=demo-project
114642025-03-07T23:30:29.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114652025-03-07T23:30:29.881ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114662025-03-07T23:30:29.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114672025-03-07T23:30:29.884ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114682025-03-07T23:30:29.884ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114692025-03-07T23:30:29.888ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114702025-03-07T23:30:29.896ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
114712025-03-07T23:30:29.899ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
114722025-03-07T23:30:29.899ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114732025-03-07T23:30:29.899ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114742025-03-07T23:30:29.900ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114752025-03-07T23:30:29.911ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
114762025-03-07T23:30:29.911ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114772025-03-07T23:30:29.911ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114782025-03-07T23:30:29.912ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114792025-03-07T23:30:29.928ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
114802025-03-07T23:30:29.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
114812025-03-07T23:30:29.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114822025-03-07T23:30:29.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114832025-03-07T23:30:29.933ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114842025-03-07T23:30:29.939ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
114852025-03-07T23:30:29.939ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
114862025-03-07T23:30:29.939ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114872025-03-07T23:30:29.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114882025-03-07T23:30:29.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114892025-03-07T23:30:29.950ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
114902025-03-07T23:30:29.950ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
114912025-03-07T23:30:29.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
114922025-03-07T23:30:29.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
114932025-03-07T23:30:29.972ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
114942025-03-07T23:30:29.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
114952025-03-07T23:30:29.979ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 uri = /v1/images?project=demo-project
114962025-03-07T23:30:29.979ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
114972025-03-07T23:30:29.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
114982025-03-07T23:30:29.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
114992025-03-07T23:30:29.984ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115002025-03-07T23:30:29.984ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115012025-03-07T23:30:29.984ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115022025-03-07T23:30:29.993ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
115032025-03-07T23:30:29.993ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
115042025-03-07T23:30:29.993ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115052025-03-07T23:30:29.993ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115062025-03-07T23:30:29.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115072025-03-07T23:30:30.002ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
115082025-03-07T23:30:30.002ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115092025-03-07T23:30:30.003ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115102025-03-07T23:30:30.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115112025-03-07T23:30:30.014ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
115122025-03-07T23:30:30.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115132025-03-07T23:30:30.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115142025-03-07T23:30:30.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115152025-03-07T23:30:30.032ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
115162025-03-07T23:30:30.041ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
115172025-03-07T23:30:30.129ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
115182025-03-07T23:30:30.129ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
115192025-03-07T23:30:30.129ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115202025-03-07T23:30:30.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115212025-03-07T23:30:30.130ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115222025-03-07T23:30:30.147ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
115232025-03-07T23:30:30.147ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115242025-03-07T23:30:30.147ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115252025-03-07T23:30:30.148ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115262025-03-07T23:30:30.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
115272025-03-07T23:30:30.157ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
115282025-03-07T23:30:30.157ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115292025-03-07T23:30:30.157ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115302025-03-07T23:30:30.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115312025-03-07T23:30:30.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
115322025-03-07T23:30:30.159ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
115332025-03-07T23:30:30.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
115342025-03-07T23:30:30.164ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
115352025-03-07T23:30:30.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
115362025-03-07T23:30:30.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database uri = /v1/images?project=demo-project
115372025-03-07T23:30:30.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
115382025-03-07T23:30:30.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
115392025-03-07T23:30:30.176ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
115402025-03-07T23:30:30.176ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
115412025-03-07T23:30:30.192ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
115422025-03-07T23:30:30.192ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
115432025-03-07T23:30:30.239ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 358337 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e638f20d-6dd0-4a6b-b489-39487e782822 response_code = 201 uri = /v1/images?project=demo-project
115442025-03-07T23:30:30.240ZINFOtest_unauthorized (external client test context): client received response status = 201
115452025-03-07T23:30:30.240ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/floating-ips?project=demo-project
115462025-03-07T23:30:30.240ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 uri = /v1/floating-ips?project=demo-project
115472025-03-07T23:30:30.240ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 uri = /v1/floating-ips?project=demo-project
115482025-03-07T23:30:30.240ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/floating-ips?project=demo-project
115492025-03-07T23:30:30.240ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115502025-03-07T23:30:30.240ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115512025-03-07T23:30:30.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115522025-03-07T23:30:30.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115532025-03-07T23:30:30.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115542025-03-07T23:30:30.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115552025-03-07T23:30:30.252ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
115562025-03-07T23:30:30.252ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
115572025-03-07T23:30:30.252ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115582025-03-07T23:30:30.252ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115592025-03-07T23:30:30.253ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115602025-03-07T23:30:30.259ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
115612025-03-07T23:30:30.259ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115622025-03-07T23:30:30.259ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115632025-03-07T23:30:30.259ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115642025-03-07T23:30:30.259ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
115652025-03-07T23:30:30.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
115662025-03-07T23:30:30.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115672025-03-07T23:30:30.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115682025-03-07T23:30:30.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115692025-03-07T23:30:30.268ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
115702025-03-07T23:30:30.268ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
115712025-03-07T23:30:30.268ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
115722025-03-07T23:30:30.268ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
115732025-03-07T23:30:30.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
115742025-03-07T23:30:30.270ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
115752025-03-07T23:30:30.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115762025-03-07T23:30:30.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115772025-03-07T23:30:30.274ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115782025-03-07T23:30:30.278ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
115792025-03-07T23:30:30.278ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
115802025-03-07T23:30:30.278ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
115812025-03-07T23:30:30.279ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
115822025-03-07T23:30:30.282ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
115832025-03-07T23:30:30.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
115842025-03-07T23:30:30.292ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 uri = /v1/floating-ips?project=demo-project
115852025-03-07T23:30:30.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
115862025-03-07T23:30:30.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115872025-03-07T23:30:30.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115882025-03-07T23:30:30.295ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
115892025-03-07T23:30:30.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115902025-03-07T23:30:30.296ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115912025-03-07T23:30:30.299ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/floating-ips?project=demo-project
115922025-03-07T23:30:30.300ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/floating-ips?project=demo-project
115932025-03-07T23:30:30.300ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
115942025-03-07T23:30:30.300ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115952025-03-07T23:30:30.300ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
115962025-03-07T23:30:30.305ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/floating-ips?project=demo-project
115972025-03-07T23:30:30.305ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
115982025-03-07T23:30:30.305ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
115992025-03-07T23:30:30.308ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
116002025-03-07T23:30:30.312ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/floating-ips?project=demo-project
116012025-03-07T23:30:30.312ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
116022025-03-07T23:30:30.312ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
116032025-03-07T23:30:30.313ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
116042025-03-07T23:30:30.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/floating-ips?project=demo-project
116052025-03-07T23:30:30.332ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/floating-ips?project=demo-project
116062025-03-07T23:30:30.332ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
116072025-03-07T23:30:30.332ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
116082025-03-07T23:30:30.332ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
116092025-03-07T23:30:30.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByOther("default IP pool for current silo") } uri = /v1/floating-ips?project=demo-project
116102025-03-07T23:30:30.336ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/floating-ips?project=demo-project
116112025-03-07T23:30:30.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
116122025-03-07T23:30:30.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
116132025-03-07T23:30:30.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
116142025-03-07T23:30:30.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/floating-ips?project=demo-project
116152025-03-07T23:30:30.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByOther("default IP pool for current silo") } result = Ok(()) uri = /v1/floating-ips?project=demo-project
116162025-03-07T23:30:30.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database uri = /v1/floating-ips?project=demo-project
116172025-03-07T23:30:30.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 roles = RoleSet { roles: {} } uri = /v1/floating-ips?project=demo-project
116182025-03-07T23:30:30.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 resource = Database result = Ok(()) uri = /v1/floating-ips?project=demo-project
116192025-03-07T23:30:30.369ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 129206 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 84fcc765-2c91-4770-bcc6-233e6c8eba38 response_code = 201 uri = /v1/floating-ips?project=demo-project
116202025-03-07T23:30:30.370ZINFOtest_unauthorized (external client test context): client received response status = 201
116212025-03-07T23:30:30.371ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/saml?silo=demo-silo
116222025-03-07T23:30:30.371ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 uri = /v1/system/identity-providers/saml?silo=demo-silo
116232025-03-07T23:30:30.371ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 uri = /v1/system/identity-providers/saml?silo=demo-silo
116242025-03-07T23:30:30.371ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/identity-providers/saml?silo=demo-silo
116252025-03-07T23:30:30.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116262025-03-07T23:30:30.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116272025-03-07T23:30:30.373ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116282025-03-07T23:30:30.377ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116292025-03-07T23:30:30.377ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116302025-03-07T23:30:30.378ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116312025-03-07T23:30:30.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
116322025-03-07T23:30:30.382ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
116332025-03-07T23:30:30.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116342025-03-07T23:30:30.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116352025-03-07T23:30:30.384ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116362025-03-07T23:30:30.386ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
116372025-03-07T23:30:30.386ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116382025-03-07T23:30:30.386ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116392025-03-07T23:30:30.387ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116402025-03-07T23:30:30.391ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
116412025-03-07T23:30:30.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
116422025-03-07T23:30:30.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116432025-03-07T23:30:30.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116442025-03-07T23:30:30.397ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116452025-03-07T23:30:30.399ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
116462025-03-07T23:30:30.400ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
116472025-03-07T23:30:30.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116482025-03-07T23:30:30.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116492025-03-07T23:30:30.400ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116502025-03-07T23:30:30.402ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
116512025-03-07T23:30:30.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
116522025-03-07T23:30:30.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
116532025-03-07T23:30:30.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
116542025-03-07T23:30:30.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
116552025-03-07T23:30:30.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
116562025-03-07T23:30:30.411ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 uri = /v1/system/identity-providers/saml?silo=demo-silo
116572025-03-07T23:30:30.411ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116582025-03-07T23:30:30.411ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116592025-03-07T23:30:30.412ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116602025-03-07T23:30:30.416ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/identity-providers/saml?silo=demo-silo
116612025-03-07T23:30:30.416ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/identity-providers/saml?silo=demo-silo
116622025-03-07T23:30:30.416ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116632025-03-07T23:30:30.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116642025-03-07T23:30:30.420ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116652025-03-07T23:30:30.423ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/saml?silo=demo-silo
116662025-03-07T23:30:30.423ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116672025-03-07T23:30:30.424ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116682025-03-07T23:30:30.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116692025-03-07T23:30:30.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116702025-03-07T23:30:30.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116712025-03-07T23:30:30.449ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") }) uri = /v1/system/identity-providers/saml?silo=demo-silo
116722025-03-07T23:30:30.449ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/identity-providers/saml?silo=demo-silo
116732025-03-07T23:30:30.449ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116742025-03-07T23:30:30.449ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116752025-03-07T23:30:30.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116762025-03-07T23:30:30.454ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/saml?silo=demo-silo
116772025-03-07T23:30:30.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116782025-03-07T23:30:30.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116792025-03-07T23:30:30.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116802025-03-07T23:30:30.466ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116812025-03-07T23:30:30.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") }) result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116822025-03-07T23:30:30.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116832025-03-07T23:30:30.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116842025-03-07T23:30:30.571ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") }) uri = /v1/system/identity-providers/saml?silo=demo-silo
116852025-03-07T23:30:30.571ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/identity-providers/saml?silo=demo-silo
116862025-03-07T23:30:30.571ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116872025-03-07T23:30:30.571ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116882025-03-07T23:30:30.572ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116892025-03-07T23:30:30.572ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116902025-03-07T23:30:30.573ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116912025-03-07T23:30:30.573ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116922025-03-07T23:30:30.573ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
116932025-03-07T23:30:30.576ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/saml?silo=demo-silo
116942025-03-07T23:30:30.576ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
116952025-03-07T23:30:30.576ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116962025-03-07T23:30:30.577ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116972025-03-07T23:30:30.580ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/identity-providers/saml?silo=demo-silo
116982025-03-07T23:30:30.587ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = SiloIdentityProviderList(Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") }) result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
116992025-03-07T23:30:30.587ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database uri = /v1/system/identity-providers/saml?silo=demo-silo
117002025-03-07T23:30:30.587ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/saml?silo=demo-silo
117012025-03-07T23:30:30.588ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 resource = Database result = Ok(()) uri = /v1/system/identity-providers/saml?silo=demo-silo
117022025-03-07T23:30:30.659ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 288203 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b01da487-9b47-4ca2-8c37-c7f22943f8f5 response_code = 201 uri = /v1/system/identity-providers/saml?silo=demo-silo
117032025-03-07T23:30:30.661ZINFOtest_unauthorized (external client test context): client received response status = 201
117042025-03-07T23:30:30.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/me/ssh-keys
117052025-03-07T23:30:30.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d uri = /v1/me/ssh-keys
117062025-03-07T23:30:30.662ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d uri = /v1/me/ssh-keys
117072025-03-07T23:30:30.662ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/me/ssh-keys
117082025-03-07T23:30:30.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117092025-03-07T23:30:30.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117102025-03-07T23:30:30.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117112025-03-07T23:30:30.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117122025-03-07T23:30:30.666ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117132025-03-07T23:30:30.667ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117142025-03-07T23:30:30.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
117152025-03-07T23:30:30.672ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117162025-03-07T23:30:30.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117172025-03-07T23:30:30.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117182025-03-07T23:30:30.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117192025-03-07T23:30:30.675ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117202025-03-07T23:30:30.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117212025-03-07T23:30:30.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117222025-03-07T23:30:30.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117232025-03-07T23:30:30.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117242025-03-07T23:30:30.683ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
117252025-03-07T23:30:30.683ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117262025-03-07T23:30:30.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117272025-03-07T23:30:30.684ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117282025-03-07T23:30:30.691ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
117292025-03-07T23:30:30.691ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117302025-03-07T23:30:30.691ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117312025-03-07T23:30:30.691ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117322025-03-07T23:30:30.692ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117332025-03-07T23:30:30.694ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117342025-03-07T23:30:30.694ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117352025-03-07T23:30:30.694ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117362025-03-07T23:30:30.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117372025-03-07T23:30:30.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117382025-03-07T23:30:30.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
117392025-03-07T23:30:30.708ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d uri = /v1/me/ssh-keys
117402025-03-07T23:30:30.708ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117412025-03-07T23:30:30.708ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117422025-03-07T23:30:30.708ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117432025-03-07T23:30:30.728ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117442025-03-07T23:30:30.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117452025-03-07T23:30:30.729ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117462025-03-07T23:30:30.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/me/ssh-keys
117472025-03-07T23:30:30.736ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/me/ssh-keys
117482025-03-07T23:30:30.736ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117492025-03-07T23:30:30.736ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117502025-03-07T23:30:30.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117512025-03-07T23:30:30.741ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/me/ssh-keys
117522025-03-07T23:30:30.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117532025-03-07T23:30:30.741ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117542025-03-07T23:30:30.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117552025-03-07T23:30:30.744ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/me/ssh-keys
117562025-03-07T23:30:30.747ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/me/ssh-keys
117572025-03-07T23:30:30.747ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/me/ssh-keys
117582025-03-07T23:30:30.747ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/me/ssh-keys
117592025-03-07T23:30:30.747ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117602025-03-07T23:30:30.747ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117612025-03-07T23:30:30.750ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117622025-03-07T23:30:30.764ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/me/ssh-keys
117632025-03-07T23:30:30.764ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117642025-03-07T23:30:30.764ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117652025-03-07T23:30:30.765ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117662025-03-07T23:30:30.778ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/me/ssh-keys
117672025-03-07T23:30:30.782ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/me/ssh-keys
117682025-03-07T23:30:30.786ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database uri = /v1/me/ssh-keys
117692025-03-07T23:30:30.788ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d roles = RoleSet { roles: {} } uri = /v1/me/ssh-keys
117702025-03-07T23:30:30.789ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d resource = Database result = Ok(()) uri = /v1/me/ssh-keys
117712025-03-07T23:30:30.796ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 133920 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9073d80a-76ce-47d0-9236-04779c3a302d response_code = 201 uri = /v1/me/ssh-keys
117722025-03-07T23:30:30.797ZINFOtest_unauthorized (external client test context): client received response status = 201
117732025-03-07T23:30:30.797ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/certificates
117742025-03-07T23:30:30.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b uri = /v1/certificates
117752025-03-07T23:30:30.804ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b uri = /v1/certificates
117762025-03-07T23:30:30.804ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/certificates
117772025-03-07T23:30:30.804ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117782025-03-07T23:30:30.804ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117792025-03-07T23:30:30.805ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117802025-03-07T23:30:30.814ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117812025-03-07T23:30:30.814ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117822025-03-07T23:30:30.814ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117832025-03-07T23:30:30.822ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
117842025-03-07T23:30:30.822ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117852025-03-07T23:30:30.822ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117862025-03-07T23:30:30.822ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117872025-03-07T23:30:30.823ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117882025-03-07T23:30:30.826ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
117892025-03-07T23:30:30.826ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117902025-03-07T23:30:30.826ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117912025-03-07T23:30:30.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117922025-03-07T23:30:30.831ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
117932025-03-07T23:30:30.836ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
117942025-03-07T23:30:30.836ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
117952025-03-07T23:30:30.836ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
117962025-03-07T23:30:30.837ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
117972025-03-07T23:30:30.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
117982025-03-07T23:30:30.840ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
117992025-03-07T23:30:30.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118002025-03-07T23:30:30.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118012025-03-07T23:30:30.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118022025-03-07T23:30:30.852ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118032025-03-07T23:30:30.852ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118042025-03-07T23:30:30.852ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118052025-03-07T23:30:30.853ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118062025-03-07T23:30:30.855ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118072025-03-07T23:30:30.858ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
118082025-03-07T23:30:30.859ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b uri = /v1/certificates
118092025-03-07T23:30:30.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118102025-03-07T23:30:30.859ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118112025-03-07T23:30:30.859ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118122025-03-07T23:30:30.864ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
118132025-03-07T23:30:30.864ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
118142025-03-07T23:30:30.864ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118152025-03-07T23:30:30.864ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118162025-03-07T23:30:30.865ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118172025-03-07T23:30:30.872ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118182025-03-07T23:30:30.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118192025-03-07T23:30:30.872ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118202025-03-07T23:30:30.873ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118212025-03-07T23:30:30.917ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118222025-03-07T23:30:30.924ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
118232025-03-07T23:30:30.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118242025-03-07T23:30:30.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118252025-03-07T23:30:30.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118262025-03-07T23:30:30.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
118272025-03-07T23:30:30.967ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118282025-03-07T23:30:30.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118292025-03-07T23:30:30.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118302025-03-07T23:30:30.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118312025-03-07T23:30:30.981ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118322025-03-07T23:30:30.989ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
118332025-03-07T23:30:30.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = SiloCertificateList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) uri = /v1/certificates
118342025-03-07T23:30:30.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/certificates
118352025-03-07T23:30:30.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = Database uri = /v1/certificates
118362025-03-07T23:30:30.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b roles = RoleSet { roles: {} } uri = /v1/certificates
118372025-03-07T23:30:30.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = Database result = Ok(()) uri = /v1/certificates
118382025-03-07T23:30:31.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/certificates
118392025-03-07T23:30:31.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = Database uri = /v1/certificates
118402025-03-07T23:30:31.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b roles = RoleSet { roles: {} } uri = /v1/certificates
118412025-03-07T23:30:31.005ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = Database result = Ok(()) uri = /v1/certificates
118422025-03-07T23:30:31.027ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/certificates
118432025-03-07T23:30:31.035ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = SiloCertificateList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) result = Ok(()) uri = /v1/certificates
118442025-03-07T23:30:31.035ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = Database uri = /v1/certificates
118452025-03-07T23:30:31.035ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b roles = RoleSet { roles: {} } uri = /v1/certificates
118462025-03-07T23:30:31.035ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b resource = Database result = Ok(()) uri = /v1/certificates
118472025-03-07T23:30:31.095ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = f88be529-23e2-4108-8732-3b23d2bee410 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
118482025-03-07T23:30:31.095ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 194 local_addr = [::1]:37181 method = GET remote_addr = [::1]:56389 req_id = f88be529-23e2-4108-8732-3b23d2bee410 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
118492025-03-07T23:30:31.096ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 4 reason = Signaled
118502025-03-07T23:30:31.096ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
118512025-03-07T23:30:31.097ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118522025-03-07T23:30:31.097ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118532025-03-07T23:30:31.097ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118542025-03-07T23:30:31.097ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118552025-03-07T23:30:31.097ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 294181 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65594235-84e4-4ddf-a868-d213e332e63b response_code = 201 uri = /v1/certificates
118562025-03-07T23:30:31.098ZINFOtest_unauthorized (external client test context): client received response status = 201
118572025-03-07T23:30:31.098ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/experimental/v1/system/support-bundles
118582025-03-07T23:30:31.099ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 uri = /experimental/v1/system/support-bundles
118592025-03-07T23:30:31.099ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 uri = /experimental/v1/system/support-bundles
118602025-03-07T23:30:31.099ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /experimental/v1/system/support-bundles
118612025-03-07T23:30:31.099ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118622025-03-07T23:30:31.099ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118632025-03-07T23:30:31.100ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118642025-03-07T23:30:31.102ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
118652025-03-07T23:30:31.110ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
118662025-03-07T23:30:31.110ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118672025-03-07T23:30:31.110ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118682025-03-07T23:30:31.111ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118692025-03-07T23:30:31.111ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118702025-03-07T23:30:31.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118712025-03-07T23:30:31.112ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118722025-03-07T23:30:31.114ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
118732025-03-07T23:30:31.114ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118742025-03-07T23:30:31.114ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118752025-03-07T23:30:31.115ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118762025-03-07T23:30:31.116ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118772025-03-07T23:30:31.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
118782025-03-07T23:30:31.116ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
118792025-03-07T23:30:31.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118802025-03-07T23:30:31.116ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118812025-03-07T23:30:31.118ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118822025-03-07T23:30:31.119ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
118832025-03-07T23:30:31.127ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
118842025-03-07T23:30:31.127ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118852025-03-07T23:30:31.128ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118862025-03-07T23:30:31.128ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118872025-03-07T23:30:31.128ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118882025-03-07T23:30:31.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118892025-03-07T23:30:31.128ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
118902025-03-07T23:30:31.129ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
118912025-03-07T23:30:31.130ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
118922025-03-07T23:30:31.130ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
118932025-03-07T23:30:31.130ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
118942025-03-07T23:30:31.130ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
118952025-03-07T23:30:31.131ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
118962025-03-07T23:30:31.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
118972025-03-07T23:30:31.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
118982025-03-07T23:30:31.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
118992025-03-07T23:30:31.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119002025-03-07T23:30:31.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119012025-03-07T23:30:31.136ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
119022025-03-07T23:30:31.141ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
119032025-03-07T23:30:31.141ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
119042025-03-07T23:30:31.141ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
119052025-03-07T23:30:31.141ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
119062025-03-07T23:30:31.144ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
119072025-03-07T23:30:31.144ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
119082025-03-07T23:30:31.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119092025-03-07T23:30:31.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119102025-03-07T23:30:31.146ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119112025-03-07T23:30:31.147ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
119122025-03-07T23:30:31.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119132025-03-07T23:30:31.147ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119142025-03-07T23:30:31.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119152025-03-07T23:30:31.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
119162025-03-07T23:30:31.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
119172025-03-07T23:30:31.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
119182025-03-07T23:30:31.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
119192025-03-07T23:30:31.164ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
119202025-03-07T23:30:31.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
119212025-03-07T23:30:31.168ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 uri = /experimental/v1/system/support-bundles
119222025-03-07T23:30:31.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource = Fleet uri = /experimental/v1/system/support-bundles
119232025-03-07T23:30:31.169ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /experimental/v1/system/support-bundles
119242025-03-07T23:30:31.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource = Database uri = /experimental/v1/system/support-bundles
119252025-03-07T23:30:31.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 roles = RoleSet { roles: {} } uri = /experimental/v1/system/support-bundles
119262025-03-07T23:30:31.169ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource = Database result = Ok(()) uri = /experimental/v1/system/support-bundles
119272025-03-07T23:30:31.170ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
119282025-03-07T23:30:31.171ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
119292025-03-07T23:30:31.174ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /experimental/v1/system/support-bundles
119302025-03-07T23:30:31.179ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource = Fleet result = Ok(()) uri = /experimental/v1/system/support-bundles
119312025-03-07T23:30:31.179ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource = Database uri = /experimental/v1/system/support-bundles
119322025-03-07T23:30:31.179ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 roles = RoleSet { roles: {} } uri = /experimental/v1/system/support-bundles
119332025-03-07T23:30:31.179ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 resource = Database result = Ok(()) uri = /experimental/v1/system/support-bundles
119342025-03-07T23:30:31.180ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
119352025-03-07T23:30:31.180ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
119362025-03-07T23:30:31.204ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (changed) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:29:51.209697Z, time_modified: 2025-03-07T23:29:51.209697Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(2)) }, tls_certs: [TlsCertificate { digest: "a5e1aaf29183de4fa0b2dfcb0e54dba2781b6de720b3d13278fadf58f9c0d2a3" }] }, "demo-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, db_silo: Silo { identity: SiloIdentity { id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, name: Name(Name("demo-silo")), description: "", time_created: 2025-03-07T23:30:08.504234Z, time_modified: 2025-03-07T23:30:08.504234Z, time_deleted: None }, discoverable: true, authentication_mode: Saml, user_provision_type: Jit, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, dns_name: "demo-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
119372025-03-07T23:30:31.204ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 107.653643ms iteration = 4 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":["a5e1aaf29183de4fa0b2dfcb0e54dba2781b6de720b3d13278fadf58f9c0d2a3"]},"demo-silo.sys.oxide-dev.test":{"silo_id":"3eb64c19-f07d-4328-aa21-1cd58fef44c0","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]}},"default_endpoint":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]},"warnings":["silo 3eb64c19-f07d-4328-aa21-1cd58fef44c0 with DNS name \\"demo-silo.sys.oxide-dev.test\\" has no usable certificates","silo 639f343f-2784-45fa-9934-45010d5cb460 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
119382025-03-07T23:30:31.253ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 154499 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a730c63c-4eeb-472c-9149-8bfb4697adb0 response_code = 201 uri = /experimental/v1/system/support-bundles
119392025-03-07T23:30:31.254ZINFOtest_unauthorized (external client test context): client received response status = 201
119402025-03-07T23:30:31.254ZINFOtest_unauthorized: verifying endpoints
119412025-03-07T23:30:31.255ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/policy
119422025-03-07T23:30:31.255ZINFOtest_unauthorized: test: privileged GET url = /v1/system/policy
119432025-03-07T23:30:31.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/policy
119442025-03-07T23:30:31.256ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 uri = /v1/system/policy
119452025-03-07T23:30:31.256ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 uri = /v1/system/policy
119462025-03-07T23:30:31.256ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/policy
119472025-03-07T23:30:31.256ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119482025-03-07T23:30:31.256ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119492025-03-07T23:30:31.257ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119502025-03-07T23:30:31.265ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
119512025-03-07T23:30:31.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119522025-03-07T23:30:31.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119532025-03-07T23:30:31.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119542025-03-07T23:30:31.271ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
119552025-03-07T23:30:31.271ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
119562025-03-07T23:30:31.271ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119572025-03-07T23:30:31.271ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119582025-03-07T23:30:31.272ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119592025-03-07T23:30:31.273ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
119602025-03-07T23:30:31.273ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119612025-03-07T23:30:31.273ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119622025-03-07T23:30:31.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119632025-03-07T23:30:31.278ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
119642025-03-07T23:30:31.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
119652025-03-07T23:30:31.282ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119662025-03-07T23:30:31.282ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119672025-03-07T23:30:31.283ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119682025-03-07T23:30:31.285ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
119692025-03-07T23:30:31.285ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
119702025-03-07T23:30:31.285ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119712025-03-07T23:30:31.285ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119722025-03-07T23:30:31.286ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119732025-03-07T23:30:31.288ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
119742025-03-07T23:30:31.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119752025-03-07T23:30:31.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119762025-03-07T23:30:31.288ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
119772025-03-07T23:30:31.290ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
119782025-03-07T23:30:31.295ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
119792025-03-07T23:30:31.295ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 uri = /v1/system/policy
119802025-03-07T23:30:31.295ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource = Database uri = /v1/system/policy
119812025-03-07T23:30:31.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 roles = RoleSet { roles: {} } uri = /v1/system/policy
119822025-03-07T23:30:31.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource = Database result = Ok(()) uri = /v1/system/policy
119832025-03-07T23:30:31.296ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource = Fleet uri = /v1/system/policy
119842025-03-07T23:30:31.296ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
119852025-03-07T23:30:31.296ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource = Database uri = /v1/system/policy
119862025-03-07T23:30:31.296ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 roles = RoleSet { roles: {} } uri = /v1/system/policy
119872025-03-07T23:30:31.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource = Database result = Ok(()) uri = /v1/system/policy
119882025-03-07T23:30:31.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/policy
119892025-03-07T23:30:31.308ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 resource = Fleet result = Ok(()) uri = /v1/system/policy
119902025-03-07T23:30:31.312ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 56048 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = baa16b79-7bd4-4edf-bb99-70d596de3067 response_code = 200 uri = /v1/system/policy
119912025-03-07T23:30:31.314ZINFOtest_unauthorized (external client test context): client received response status = 200
119922025-03-07T23:30:31.314ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/policy
119932025-03-07T23:30:31.315ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/policy
119942025-03-07T23:30:31.315ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 uri = /v1/system/policy
119952025-03-07T23:30:31.315ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 uri = /v1/system/policy
119962025-03-07T23:30:31.315ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/policy
119972025-03-07T23:30:31.315ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
119982025-03-07T23:30:31.315ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
119992025-03-07T23:30:31.316ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120002025-03-07T23:30:31.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120012025-03-07T23:30:31.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120022025-03-07T23:30:31.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120032025-03-07T23:30:31.323ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
120042025-03-07T23:30:31.323ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
120052025-03-07T23:30:31.323ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120062025-03-07T23:30:31.323ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120072025-03-07T23:30:31.324ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120082025-03-07T23:30:31.327ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
120092025-03-07T23:30:31.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120102025-03-07T23:30:31.327ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120112025-03-07T23:30:31.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120122025-03-07T23:30:31.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
120132025-03-07T23:30:31.337ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
120142025-03-07T23:30:31.337ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120152025-03-07T23:30:31.337ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120162025-03-07T23:30:31.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120172025-03-07T23:30:31.346ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
120182025-03-07T23:30:31.346ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
120192025-03-07T23:30:31.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120202025-03-07T23:30:31.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120212025-03-07T23:30:31.348ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120222025-03-07T23:30:31.350ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
120232025-03-07T23:30:31.351ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
120242025-03-07T23:30:31.351ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
120252025-03-07T23:30:31.352ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
120262025-03-07T23:30:31.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
120272025-03-07T23:30:31.361ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
120282025-03-07T23:30:31.362ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 uri = /v1/system/policy
120292025-03-07T23:30:31.362ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource = Database uri = /v1/system/policy
120302025-03-07T23:30:31.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 roles = RoleSet { roles: {} } uri = /v1/system/policy
120312025-03-07T23:30:31.362ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource = Database result = Ok(()) uri = /v1/system/policy
120322025-03-07T23:30:31.363ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource = Fleet uri = /v1/system/policy
120332025-03-07T23:30:31.364ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
120342025-03-07T23:30:31.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource = Database uri = /v1/system/policy
120352025-03-07T23:30:31.364ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 roles = RoleSet { roles: {} } uri = /v1/system/policy
120362025-03-07T23:30:31.364ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource = Database result = Ok(()) uri = /v1/system/policy
120372025-03-07T23:30:31.368ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 roles = RoleSet { roles: {} } uri = /v1/system/policy
120382025-03-07T23:30:31.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 resource = Fleet result = Err(Forbidden) uri = /v1/system/policy
120392025-03-07T23:30:31.380ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 65691 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7de08799-b4b7-407a-87c4-bb5a90b382c9 response_code = 403 uri = /v1/system/policy
120402025-03-07T23:30:31.381ZINFOtest_unauthorized (external client test context): client received response status = 403
120412025-03-07T23:30:31.382ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/policy
120422025-03-07T23:30:31.382ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/policy
120432025-03-07T23:30:31.382ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 uri = /v1/system/policy
120442025-03-07T23:30:31.382ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 uri = /v1/system/policy
120452025-03-07T23:30:31.383ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 uri = /v1/system/policy
120462025-03-07T23:30:31.383ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 uri = /v1/system/policy
120472025-03-07T23:30:31.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 resource = Database uri = /v1/system/policy
120482025-03-07T23:30:31.383ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 roles = RoleSet { roles: {} } uri = /v1/system/policy
120492025-03-07T23:30:31.383ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/policy
120502025-03-07T23:30:31.383ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 770 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c5295ed-e4af-4570-8309-bdad465bd6e6 response_code = 401 uri = /v1/system/policy
120512025-03-07T23:30:31.383ZINFOtest_unauthorized (external client test context): client received response status = 401
120522025-03-07T23:30:31.383ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/policy
120532025-03-07T23:30:31.383ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/policy
120542025-03-07T23:30:31.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 10f3159f-2ebb-4938-bae3-682e14be1aa0 uri = /v1/system/policy
120552025-03-07T23:30:31.384ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 10f3159f-2ebb-4938-bae3-682e14be1aa0 uri = /v1/system/policy
120562025-03-07T23:30:31.384ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 10f3159f-2ebb-4938-bae3-682e14be1aa0 uri = /v1/system/policy
120572025-03-07T23:30:31.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 215 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 10f3159f-2ebb-4938-bae3-682e14be1aa0 response_code = 401 uri = /v1/system/policy
120582025-03-07T23:30:31.385ZINFOtest_unauthorized (external client test context): client received response status = 401
120592025-03-07T23:30:31.386ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/policy
120602025-03-07T23:30:31.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/policy
120612025-03-07T23:30:31.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 157dd429-cc62-444f-b681-f72dbc9fd244 uri = /v1/system/policy
120622025-03-07T23:30:31.386ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 157dd429-cc62-444f-b681-f72dbc9fd244 uri = /v1/system/policy
120632025-03-07T23:30:32.652ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:133:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:141:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 157dd429-cc62-444f-b681-f72dbc9fd244 uri = /v1/system/policy
120642025-03-07T23:30:32.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1266140 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 157dd429-cc62-444f-b681-f72dbc9fd244 response_code = 401 uri = /v1/system/policy
120652025-03-07T23:30:32.652ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
120662025-03-07T23:30:32.652ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
120672025-03-07T23:30:32.653ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
120682025-03-07T23:30:32.653ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
120692025-03-07T23:30:32.653ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
120702025-03-07T23:30:32.653ZERROtest_unauthorized (collection-task): timer-based collection request queue is full! This may indicate that the producer has a sampling interval that is too fast for the amount of data it generates collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/collection_task.rs:845 interval = 1s producer_id = a6458b7d-87c3-4483-be96-854d814c20de
120712025-03-07T23:30:32.653ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
120722025-03-07T23:30:32.653ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
120732025-03-07T23:30:32.653ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
120742025-03-07T23:30:32.655ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
120752025-03-07T23:30:32.655ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
120762025-03-07T23:30:32.655ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
120772025-03-07T23:30:32.655ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
120782025-03-07T23:30:32.656ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
120792025-03-07T23:30:32.656ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
120802025-03-07T23:30:32.656ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
120812025-03-07T23:30:32.657ZINFOtest_unauthorized (external client test context): client received response status = 401
120822025-03-07T23:30:32.657ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/policy
120832025-03-07T23:30:32.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/policy
120842025-03-07T23:30:32.658ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 737df7ce-52fd-474a-ad8b-c050fc9c7c02 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
120852025-03-07T23:30:33.362ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 737df7ce-52fd-474a-ad8b-c050fc9c7c02 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
120862025-03-07T23:30:33.362ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 737df7ce-52fd-474a-ad8b-c050fc9c7c02 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
120872025-03-07T23:30:33.364ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 737df7ce-52fd-474a-ad8b-c050fc9c7c02 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
120882025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:55992 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120892025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:64177 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120902025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:64141 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120912025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:62838 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120922025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:55698 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120932025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:45391 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120942025-03-07T23:30:33.367ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:59892 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
120952025-03-07T23:30:33.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 uri = /v1/system/policy
120962025-03-07T23:30:33.369ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
120972025-03-07T23:30:33.369ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
120982025-03-07T23:30:33.369ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
120992025-03-07T23:30:33.370ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
121002025-03-07T23:30:33.370ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
121012025-03-07T23:30:33.370ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
121022025-03-07T23:30:33.370ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 uri = /v1/system/policy
121032025-03-07T23:30:33.370ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/policy
121042025-03-07T23:30:33.370ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121052025-03-07T23:30:33.370ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121062025-03-07T23:30:33.371ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121072025-03-07T23:30:33.373ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:55992 req_id = 7e4d5acb-8328-42aa-91f7-74fcdddafbf8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121082025-03-07T23:30:33.373ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:64177 req_id = ff941d98-285d-47cb-863c-fc26edc7ee99 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121092025-03-07T23:30:33.373ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 715734 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 737df7ce-52fd-474a-ad8b-c050fc9c7c02 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121102025-03-07T23:30:33.374ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1338 local_addr = [::1]:37181 method = GET remote_addr = [::1]:55992 req_id = 7e4d5acb-8328-42aa-91f7-74fcdddafbf8 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121112025-03-07T23:30:33.375ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1533 local_addr = [::1]:37181 method = GET remote_addr = [::1]:64177 req_id = ff941d98-285d-47cb-863c-fc26edc7ee99 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121122025-03-07T23:30:33.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121132025-03-07T23:30:33.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121142025-03-07T23:30:33.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121152025-03-07T23:30:33.378ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:64141 req_id = 3a648f3c-5fad-4f79-8f2d-90e70b598523 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121162025-03-07T23:30:33.378ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:62838 req_id = e8172078-8fd8-4556-b336-ae2b3587c7d4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121172025-03-07T23:30:33.378ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:55698 req_id = 04443d76-5cc1-4bdf-90f4-970abda612e3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121182025-03-07T23:30:33.379ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:45391 req_id = 7796e752-79b2-426c-90ef-decf93c224da sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121192025-03-07T23:30:33.379ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:59892 req_id = 5ea90ffb-0522-4380-85b2-1ae45d65def2 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121202025-03-07T23:30:33.393ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "737df7ce-52fd-474a-ad8b-c050fc9c7c02", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:32 GMT"} })
121212025-03-07T23:30:33.394ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121222025-03-07T23:30:33.395ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 16623 local_addr = [::1]:37181 method = GET remote_addr = [::1]:64141 req_id = 3a648f3c-5fad-4f79-8f2d-90e70b598523 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121232025-03-07T23:30:33.395ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 16606 local_addr = [::1]:37181 method = GET remote_addr = [::1]:62838 req_id = e8172078-8fd8-4556-b336-ae2b3587c7d4 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121242025-03-07T23:30:33.395ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 16659 local_addr = [::1]:37181 method = GET remote_addr = [::1]:55698 req_id = 04443d76-5cc1-4bdf-90f4-970abda612e3 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121252025-03-07T23:30:33.395ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 16585 local_addr = [::1]:37181 method = GET remote_addr = [::1]:45391 req_id = 7796e752-79b2-426c-90ef-decf93c224da response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121262025-03-07T23:30:33.395ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 16280 local_addr = [::1]:37181 method = GET remote_addr = [::1]:59892 req_id = 5ea90ffb-0522-4380-85b2-1ae45d65def2 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
121272025-03-07T23:30:33.397ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a3174bfa-1b34-41a3-a5f8-d52689aed017 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121282025-03-07T23:30:33.398ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a3174bfa-1b34-41a3-a5f8-d52689aed017 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121292025-03-07T23:30:33.399ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a3174bfa-1b34-41a3-a5f8-d52689aed017 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121302025-03-07T23:30:33.399ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a3174bfa-1b34-41a3-a5f8-d52689aed017 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121312025-03-07T23:30:33.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
121322025-03-07T23:30:33.400ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
121332025-03-07T23:30:33.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121342025-03-07T23:30:33.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121352025-03-07T23:30:33.401ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121362025-03-07T23:30:33.406ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8839 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = a3174bfa-1b34-41a3-a5f8-d52689aed017 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121372025-03-07T23:30:33.428ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "a3174bfa-1b34-41a3-a5f8-d52689aed017", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:32 GMT"} })
121382025-03-07T23:30:33.428ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
121392025-03-07T23:30:33.428ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
121402025-03-07T23:30:33.428ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
121412025-03-07T23:30:33.432ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
121422025-03-07T23:30:33.432ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121432025-03-07T23:30:33.432ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
121442025-03-07T23:30:33.432ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121452025-03-07T23:30:33.432ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121462025-03-07T23:30:33.437ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121472025-03-07T23:30:33.448ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1c9194b1-8d51-43c8-9732-83e3336ed5da uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121482025-03-07T23:30:33.450ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1c9194b1-8d51-43c8-9732-83e3336ed5da resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121492025-03-07T23:30:33.451ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1c9194b1-8d51-43c8-9732-83e3336ed5da roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121502025-03-07T23:30:33.452ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1c9194b1-8d51-43c8-9732-83e3336ed5da resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121512025-03-07T23:30:33.455ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
121522025-03-07T23:30:33.460ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
121532025-03-07T23:30:33.461ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121542025-03-07T23:30:33.461ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121552025-03-07T23:30:33.461ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121562025-03-07T23:30:33.463ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14275 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1c9194b1-8d51-43c8-9732-83e3336ed5da response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
121572025-03-07T23:30:33.471ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "1c9194b1-8d51-43c8-9732-83e3336ed5da", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:32 GMT"} })
121582025-03-07T23:30:33.472ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121592025-03-07T23:30:33.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
121602025-03-07T23:30:33.473ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
121612025-03-07T23:30:33.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121622025-03-07T23:30:33.473ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121632025-03-07T23:30:33.474ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121642025-03-07T23:30:33.477ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 371cbb15-7ee6-4652-a08c-5fcf7595ace3 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121652025-03-07T23:30:33.477ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 371cbb15-7ee6-4652-a08c-5fcf7595ace3 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121662025-03-07T23:30:33.477ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 371cbb15-7ee6-4652-a08c-5fcf7595ace3 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121672025-03-07T23:30:33.478ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 371cbb15-7ee6-4652-a08c-5fcf7595ace3 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121682025-03-07T23:30:33.486ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
121692025-03-07T23:30:33.486ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
121702025-03-07T23:30:33.486ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
121712025-03-07T23:30:33.487ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
121722025-03-07T23:30:33.488ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 10955 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 371cbb15-7ee6-4652-a08c-5fcf7595ace3 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
121732025-03-07T23:30:33.489ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "371cbb15-7ee6-4652-a08c-5fcf7595ace3", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:32 GMT"} })
121742025-03-07T23:30:33.489ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
121752025-03-07T23:30:33.489ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
121762025-03-07T23:30:33.489ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
121772025-03-07T23:30:33.504ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
121782025-03-07T23:30:33.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
121792025-03-07T23:30:33.509ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 uri = /v1/system/policy
121802025-03-07T23:30:33.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 resource = Fleet uri = /v1/system/policy
121812025-03-07T23:30:33.509ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
121822025-03-07T23:30:33.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 resource = Database uri = /v1/system/policy
121832025-03-07T23:30:33.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 roles = RoleSet { roles: {} } uri = /v1/system/policy
121842025-03-07T23:30:33.510ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 resource = Database result = Ok(()) uri = /v1/system/policy
121852025-03-07T23:30:33.537ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 roles = RoleSet { roles: {} } uri = /v1/system/policy
121862025-03-07T23:30:33.546ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 resource = Fleet result = Err(Forbidden) uri = /v1/system/policy
121872025-03-07T23:30:33.546ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 178365 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bb5d96ae-f232-4ffd-baba-98acb19b7830 response_code = 403 uri = /v1/system/policy
121882025-03-07T23:30:33.548ZINFOtest_unauthorized (external client test context): client received response status = 403
121892025-03-07T23:30:33.548ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/policy
121902025-03-07T23:30:33.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/policy
121912025-03-07T23:30:33.576ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa uri = /v1/system/policy
121922025-03-07T23:30:33.576ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
121932025-03-07T23:30:33.577ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa uri = /v1/system/policy
121942025-03-07T23:30:33.577ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa uri = /v1/system/policy
121952025-03-07T23:30:33.577ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa uri = /v1/system/policy
121962025-03-07T23:30:33.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa resource = Fleet uri = /v1/system/policy
121972025-03-07T23:30:33.577ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa roles = RoleSet { roles: {} } uri = /v1/system/policy
121982025-03-07T23:30:33.577ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/policy
121992025-03-07T23:30:33.577ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122002025-03-07T23:30:33.577ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1064 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f9ed540-87ae-4e08-97eb-13a037474eaa response_code = 401 uri = /v1/system/policy
122012025-03-07T23:30:33.585ZINFOtest_unauthorized (external client test context): client received response status = 401
122022025-03-07T23:30:33.585ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/policy
122032025-03-07T23:30:33.585ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/policy
122042025-03-07T23:30:33.585ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122052025-03-07T23:30:33.587ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122062025-03-07T23:30:33.587ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122072025-03-07T23:30:33.587ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
122082025-03-07T23:30:33.588ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1222f61e-058f-4be7-929b-d613b7e36ef8 uri = /v1/system/policy
122092025-03-07T23:30:33.588ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1222f61e-058f-4be7-929b-d613b7e36ef8 uri = /v1/system/policy
122102025-03-07T23:30:33.588ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1222f61e-058f-4be7-929b-d613b7e36ef8 uri = /v1/system/policy
122112025-03-07T23:30:33.588ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 491 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1222f61e-058f-4be7-929b-d613b7e36ef8 response_code = 401 uri = /v1/system/policy
122122025-03-07T23:30:33.589ZINFOtest_unauthorized (external client test context): client received response status = 401
122132025-03-07T23:30:33.589ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/policy
122142025-03-07T23:30:33.589ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/policy
122152025-03-07T23:30:33.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3caac375-a912-4624-bbbe-e61a4ef9676d uri = /v1/system/policy
122162025-03-07T23:30:33.596ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3caac375-a912-4624-bbbe-e61a4ef9676d uri = /v1/system/policy
122172025-03-07T23:30:33.599ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:157:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:165:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_policy_update::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::FleetRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3caac375-a912-4624-bbbe-e61a4ef9676d uri = /v1/system/policy
122182025-03-07T23:30:33.600ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5445 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3caac375-a912-4624-bbbe-e61a4ef9676d response_code = 401 uri = /v1/system/policy
122192025-03-07T23:30:33.604ZINFOtest_unauthorized (external client test context): client received response status = 401
122202025-03-07T23:30:33.604ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/policy
122212025-03-07T23:30:33.604ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/policy
122222025-03-07T23:30:33.609ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 712e0e1a-afef-4281-934c-539db05fdee8 uri = /v1/system/policy
122232025-03-07T23:30:33.610ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 614 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 712e0e1a-afef-4281-934c-539db05fdee8 response_code = 405 uri = /v1/system/policy
122242025-03-07T23:30:33.613ZINFOtest_unauthorized (external client test context): client received response status = 405
122252025-03-07T23:30:33.613ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/policy
122262025-03-07T23:30:33.613ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/policy
122272025-03-07T23:30:33.624ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ae2a354b-78f9-45e7-85b9-10f68acda5ec uri = /v1/system/policy
122282025-03-07T23:30:33.624ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 93 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ae2a354b-78f9-45e7-85b9-10f68acda5ec response_code = 405 uri = /v1/system/policy
122292025-03-07T23:30:33.631ZINFOtest_unauthorized (external client test context): client received response status = 405
122302025-03-07T23:30:33.631ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/policy
122312025-03-07T23:30:33.632ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/policy
122322025-03-07T23:30:33.632ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 091c744e-fd21-4849-9db9-c566b4eb3a0d uri = /v1/system/policy
122332025-03-07T23:30:33.632ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 247 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 091c744e-fd21-4849-9db9-c566b4eb3a0d response_code = 405 uri = /v1/system/policy
122342025-03-07T23:30:33.635ZINFOtest_unauthorized (external client test context): client received response status = 405
122352025-03-07T23:30:33.638ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/policy
122362025-03-07T23:30:33.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/policy
122372025-03-07T23:30:33.641ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5266a244-a95c-4f44-8ebe-814a82298943 uri = /v1/system/policy
122382025-03-07T23:30:33.641ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5266a244-a95c-4f44-8ebe-814a82298943 response_code = 405 uri = /v1/system/policy
122392025-03-07T23:30:33.650ZINFOtest_unauthorized (external client test context): client received response status = 405
122402025-03-07T23:30:33.650ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/policy
122412025-03-07T23:30:33.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/policy
122422025-03-07T23:30:33.651ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0345ac3c-35a6-4f27-85d0-f0f2106af9cf uri = /v1/system/policy
122432025-03-07T23:30:33.651ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 136 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0345ac3c-35a6-4f27-85d0-f0f2106af9cf response_code = 405 uri = /v1/system/policy
122442025-03-07T23:30:33.651ZINFOtest_unauthorized (external client test context): client received response status = 405
122452025-03-07T23:30:33.651ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/policy
122462025-03-07T23:30:33.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/policy
122472025-03-07T23:30:33.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4d44ad4-71c7-4a77-ae20-97ad42a0fe57 uri = /v1/system/policy
122482025-03-07T23:30:33.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4d44ad4-71c7-4a77-ae20-97ad42a0fe57 response_code = 405 uri = /v1/system/policy
122492025-03-07T23:30:33.652ZINFOtest_unauthorized (external client test context): client received response status = 405
122502025-03-07T23:30:33.652ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/policy
122512025-03-07T23:30:33.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/policy
122522025-03-07T23:30:33.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b6d41544-4c3b-435e-b6b7-4ee7d7be2b60 uri = /v1/system/policy
122532025-03-07T23:30:33.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b6d41544-4c3b-435e-b6b7-4ee7d7be2b60 response_code = 405 uri = /v1/system/policy
122542025-03-07T23:30:33.652ZINFOtest_unauthorized (external client test context): client received response status = 405
122552025-03-07T23:30:33.653ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/policy
122562025-03-07T23:30:33.653ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/policy
122572025-03-07T23:30:33.653ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 57923e3f-39d7-4b8e-bf99-1610cf4b6d58 uri = /v1/system/policy
122582025-03-07T23:30:33.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 57923e3f-39d7-4b8e-bf99-1610cf4b6d58 response_code = 405 uri = /v1/system/policy
122592025-03-07T23:30:33.654ZINFOtest_unauthorized (external client test context): client received response status = 405
122602025-03-07T23:30:33.654ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/policy
122612025-03-07T23:30:33.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/policy
122622025-03-07T23:30:33.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7ebe3082-09d7-4a0e-87f3-bf4212a6216b uri = /v1/system/policy
122632025-03-07T23:30:33.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7ebe3082-09d7-4a0e-87f3-bf4212a6216b response_code = 405 uri = /v1/system/policy
122642025-03-07T23:30:33.654ZINFOtest_unauthorized (external client test context): client received response status = 405
122652025-03-07T23:30:33.654ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/policy
122662025-03-07T23:30:33.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/policy
122672025-03-07T23:30:33.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0e8f7e06-8b94-4b6c-aefa-1a40b0837c18 uri = /v1/system/policy
122682025-03-07T23:30:33.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0e8f7e06-8b94-4b6c-aefa-1a40b0837c18 response_code = 405 uri = /v1/system/policy
122692025-03-07T23:30:33.654ZINFOtest_unauthorized (external client test context): client received response status = 405
122702025-03-07T23:30:33.654ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/policy
122712025-03-07T23:30:33.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/policy
122722025-03-07T23:30:33.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0febb82a-e110-42d6-9ff1-9e1785d6ba35 uri = /v1/system/policy
122732025-03-07T23:30:33.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0febb82a-e110-42d6-9ff1-9e1785d6ba35 response_code = 405 uri = /v1/system/policy
122742025-03-07T23:30:33.655ZINFOtest_unauthorized (external client test context): client received response status = 405
122752025-03-07T23:30:33.655ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/policy
122762025-03-07T23:30:33.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/policy
122772025-03-07T23:30:33.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9eb0d9a5-b512-4889-bd95-de9248f19893 uri = /v1/system/policy
122782025-03-07T23:30:33.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9eb0d9a5-b512-4889-bd95-de9248f19893 response_code = 405 uri = /v1/system/policy
122792025-03-07T23:30:33.655ZINFOtest_unauthorized (external client test context): client received response status = 405
122802025-03-07T23:30:33.655ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/policy
122812025-03-07T23:30:33.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/policy
122822025-03-07T23:30:33.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b uri = /v1/system/policy
122832025-03-07T23:30:33.656ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b uri = /v1/system/policy
122842025-03-07T23:30:33.656ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/policy
122852025-03-07T23:30:33.656ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122862025-03-07T23:30:33.656ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122872025-03-07T23:30:33.657ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122882025-03-07T23:30:33.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122892025-03-07T23:30:33.660ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122902025-03-07T23:30:33.661ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122912025-03-07T23:30:33.665ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
122922025-03-07T23:30:33.665ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
122932025-03-07T23:30:33.665ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122942025-03-07T23:30:33.665ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122952025-03-07T23:30:33.666ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
122962025-03-07T23:30:33.669ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
122972025-03-07T23:30:33.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
122982025-03-07T23:30:33.669ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
122992025-03-07T23:30:33.669ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123002025-03-07T23:30:33.671ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123012025-03-07T23:30:33.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
123022025-03-07T23:30:33.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123032025-03-07T23:30:33.677ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123042025-03-07T23:30:33.677ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123052025-03-07T23:30:33.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
123062025-03-07T23:30:33.682ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
123072025-03-07T23:30:33.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123082025-03-07T23:30:33.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123092025-03-07T23:30:33.683ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123102025-03-07T23:30:33.692ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123112025-03-07T23:30:33.692ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123122025-03-07T23:30:33.692ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123132025-03-07T23:30:33.692ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123142025-03-07T23:30:33.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123152025-03-07T23:30:33.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
123162025-03-07T23:30:33.703ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b uri = /v1/system/policy
123172025-03-07T23:30:33.703ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource = Database uri = /v1/system/policy
123182025-03-07T23:30:33.703ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b roles = RoleSet { roles: {} } uri = /v1/system/policy
123192025-03-07T23:30:33.703ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource = Database result = Ok(()) uri = /v1/system/policy
123202025-03-07T23:30:33.711ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource = Fleet uri = /v1/system/policy
123212025-03-07T23:30:33.711ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/policy
123222025-03-07T23:30:33.711ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource = Database uri = /v1/system/policy
123232025-03-07T23:30:33.711ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b roles = RoleSet { roles: {} } uri = /v1/system/policy
123242025-03-07T23:30:33.712ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource = Database result = Ok(()) uri = /v1/system/policy
123252025-03-07T23:30:33.725ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/policy
123262025-03-07T23:30:33.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b resource = Fleet result = Ok(()) uri = /v1/system/policy
123272025-03-07T23:30:33.747ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 91266 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d39c9478-2ecf-4089-829c-0b4d7f57bc0b response_code = 200 uri = /v1/system/policy
123282025-03-07T23:30:33.747ZINFOtest_unauthorized (external client test context): client received response status = 200
123292025-03-07T23:30:33.748ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools
123302025-03-07T23:30:33.748ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools
123312025-03-07T23:30:33.748ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools
123322025-03-07T23:30:33.749ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 uri = /v1/system/ip-pools
123332025-03-07T23:30:33.749ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 uri = /v1/system/ip-pools
123342025-03-07T23:30:33.749ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
123352025-03-07T23:30:33.749ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123362025-03-07T23:30:33.749ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123372025-03-07T23:30:33.750ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123382025-03-07T23:30:33.755ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123392025-03-07T23:30:33.755ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123402025-03-07T23:30:33.756ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123412025-03-07T23:30:33.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
123422025-03-07T23:30:33.779ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
123432025-03-07T23:30:33.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123442025-03-07T23:30:33.779ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123452025-03-07T23:30:33.780ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123462025-03-07T23:30:33.789ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123472025-03-07T23:30:33.790ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123482025-03-07T23:30:33.790ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123492025-03-07T23:30:33.791ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123502025-03-07T23:30:33.796ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123512025-03-07T23:30:33.802ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
123522025-03-07T23:30:33.802ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123532025-03-07T23:30:33.803ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123542025-03-07T23:30:33.803ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123552025-03-07T23:30:33.815ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
123562025-03-07T23:30:33.819ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
123572025-03-07T23:30:33.819ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123582025-03-07T23:30:33.819ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123592025-03-07T23:30:33.820ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123602025-03-07T23:30:33.831ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123612025-03-07T23:30:33.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123622025-03-07T23:30:33.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123632025-03-07T23:30:33.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123642025-03-07T23:30:33.852ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
123652025-03-07T23:30:33.856ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
123662025-03-07T23:30:33.863ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 uri = /v1/system/ip-pools
123672025-03-07T23:30:33.863ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource = IpPoolList uri = /v1/system/ip-pools
123682025-03-07T23:30:33.863ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
123692025-03-07T23:30:33.863ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource = Database uri = /v1/system/ip-pools
123702025-03-07T23:30:33.863ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
123712025-03-07T23:30:33.864ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource = Database result = Ok(()) uri = /v1/system/ip-pools
123722025-03-07T23:30:33.892ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
123732025-03-07T23:30:33.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
123742025-03-07T23:30:33.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource = Database uri = /v1/system/ip-pools
123752025-03-07T23:30:33.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
123762025-03-07T23:30:33.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 resource = Database result = Ok(()) uri = /v1/system/ip-pools
123772025-03-07T23:30:33.909ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 160458 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45d6b3f5-3cfe-40a7-9c58-4884d08f7d44 response_code = 200 uri = /v1/system/ip-pools
123782025-03-07T23:30:33.910ZINFOtest_unauthorized (external client test context): client received response status = 200
123792025-03-07T23:30:33.910ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools
123802025-03-07T23:30:33.910ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools
123812025-03-07T23:30:33.910ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 uri = /v1/system/ip-pools
123822025-03-07T23:30:33.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 uri = /v1/system/ip-pools
123832025-03-07T23:30:33.910ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools
123842025-03-07T23:30:33.910ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123852025-03-07T23:30:33.910ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123862025-03-07T23:30:33.911ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123872025-03-07T23:30:33.914ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123882025-03-07T23:30:33.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123892025-03-07T23:30:33.915ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123902025-03-07T23:30:33.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
123912025-03-07T23:30:33.917ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
123922025-03-07T23:30:33.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123932025-03-07T23:30:33.917ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123942025-03-07T23:30:33.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123952025-03-07T23:30:33.930ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
123962025-03-07T23:30:33.930ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
123972025-03-07T23:30:33.930ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
123982025-03-07T23:30:33.931ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
123992025-03-07T23:30:33.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
124002025-03-07T23:30:33.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
124012025-03-07T23:30:33.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124022025-03-07T23:30:33.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124032025-03-07T23:30:33.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124042025-03-07T23:30:33.949ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
124052025-03-07T23:30:33.949ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
124062025-03-07T23:30:33.949ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124072025-03-07T23:30:33.949ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124082025-03-07T23:30:33.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124092025-03-07T23:30:33.952ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
124102025-03-07T23:30:33.952ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124112025-03-07T23:30:33.952ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124122025-03-07T23:30:33.952ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124132025-03-07T23:30:33.960ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
124142025-03-07T23:30:33.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
124152025-03-07T23:30:33.965ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 uri = /v1/system/ip-pools
124162025-03-07T23:30:33.965ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 resource = IpPoolList uri = /v1/system/ip-pools
124172025-03-07T23:30:33.965ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
124182025-03-07T23:30:33.965ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 resource = Database uri = /v1/system/ip-pools
124192025-03-07T23:30:33.965ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
124202025-03-07T23:30:33.965ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 resource = Database result = Ok(()) uri = /v1/system/ip-pools
124212025-03-07T23:30:33.970ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
124222025-03-07T23:30:34.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 resource = IpPoolList result = Err(Forbidden) uri = /v1/system/ip-pools
124232025-03-07T23:30:34.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 97314 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db961dc5-8397-46a0-bb16-bd5c8cfbae61 response_code = 403 uri = /v1/system/ip-pools
124242025-03-07T23:30:34.008ZINFOtest_unauthorized (external client test context): client received response status = 403
124252025-03-07T23:30:34.008ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools
124262025-03-07T23:30:34.008ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools
124272025-03-07T23:30:34.008ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf uri = /v1/system/ip-pools
124282025-03-07T23:30:34.008ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf uri = /v1/system/ip-pools
124292025-03-07T23:30:34.008ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf uri = /v1/system/ip-pools
124302025-03-07T23:30:34.008ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf uri = /v1/system/ip-pools
124312025-03-07T23:30:34.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf resource = IpPoolList uri = /v1/system/ip-pools
124322025-03-07T23:30:34.008ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
124332025-03-07T23:30:34.009ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf resource = IpPoolList result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools
124342025-03-07T23:30:34.009ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 926 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 373a151a-880a-4e1b-9d84-67644ee938bf response_code = 401 uri = /v1/system/ip-pools
124352025-03-07T23:30:34.009ZINFOtest_unauthorized (external client test context): client received response status = 401
124362025-03-07T23:30:34.009ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools
124372025-03-07T23:30:34.009ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools
124382025-03-07T23:30:34.009ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9ff7ea22-fd8d-440e-b68a-bcbabfd6f598 uri = /v1/system/ip-pools
124392025-03-07T23:30:34.010ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9ff7ea22-fd8d-440e-b68a-bcbabfd6f598 uri = /v1/system/ip-pools
124402025-03-07T23:30:34.010ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9ff7ea22-fd8d-440e-b68a-bcbabfd6f598 uri = /v1/system/ip-pools
124412025-03-07T23:30:34.010ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 174 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9ff7ea22-fd8d-440e-b68a-bcbabfd6f598 response_code = 401 uri = /v1/system/ip-pools
124422025-03-07T23:30:34.010ZINFOtest_unauthorized (external client test context): client received response status = 401
124432025-03-07T23:30:34.010ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools
124442025-03-07T23:30:34.010ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools
124452025-03-07T23:30:34.010ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a912e68a-1b67-40c2-9ac1-f9c42c1cacb8 uri = /v1/system/ip-pools
124462025-03-07T23:30:34.010ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a912e68a-1b67-40c2-9ac1-f9c42c1cacb8 uri = /v1/system/ip-pools
124472025-03-07T23:30:34.012ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1085:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1102:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPool>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a912e68a-1b67-40c2-9ac1-f9c42c1cacb8 uri = /v1/system/ip-pools
124482025-03-07T23:30:34.012ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1126 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a912e68a-1b67-40c2-9ac1-f9c42c1cacb8 response_code = 401 uri = /v1/system/ip-pools
124492025-03-07T23:30:34.012ZINFOtest_unauthorized (external client test context): client received response status = 401
124502025-03-07T23:30:34.012ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools
124512025-03-07T23:30:34.037ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools
124522025-03-07T23:30:34.038ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7ae92756-acec-48b4-bb81-30521e17d175 uri = /v1/system/ip-pools
124532025-03-07T23:30:34.038ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 112 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7ae92756-acec-48b4-bb81-30521e17d175 response_code = 405 uri = /v1/system/ip-pools
124542025-03-07T23:30:34.038ZINFOtest_unauthorized (external client test context): client received response status = 405
124552025-03-07T23:30:34.038ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools
124562025-03-07T23:30:34.038ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools
124572025-03-07T23:30:34.039ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f63e0bb-c4cd-418f-8fda-3a54ee465349 uri = /v1/system/ip-pools
124582025-03-07T23:30:34.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f63e0bb-c4cd-418f-8fda-3a54ee465349 response_code = 405 uri = /v1/system/ip-pools
124592025-03-07T23:30:34.039ZINFOtest_unauthorized (external client test context): client received response status = 405
124602025-03-07T23:30:34.039ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools
124612025-03-07T23:30:34.039ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools
124622025-03-07T23:30:34.039ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c71c4b08-9d0b-4c44-bd91-0443411c00c9 uri = /v1/system/ip-pools
124632025-03-07T23:30:34.040ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c71c4b08-9d0b-4c44-bd91-0443411c00c9 response_code = 405 uri = /v1/system/ip-pools
124642025-03-07T23:30:34.040ZINFOtest_unauthorized (external client test context): client received response status = 405
124652025-03-07T23:30:34.040ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools
124662025-03-07T23:30:34.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools
124672025-03-07T23:30:34.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a84630fc-73d3-4e95-85df-1f290e5ceda5 uri = /v1/system/ip-pools
124682025-03-07T23:30:34.040ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a84630fc-73d3-4e95-85df-1f290e5ceda5 response_code = 405 uri = /v1/system/ip-pools
124692025-03-07T23:30:34.040ZINFOtest_unauthorized (external client test context): client received response status = 405
124702025-03-07T23:30:34.040ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools
124712025-03-07T23:30:34.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools
124722025-03-07T23:30:34.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 uri = /v1/system/ip-pools
124732025-03-07T23:30:34.041ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 uri = /v1/system/ip-pools
124742025-03-07T23:30:34.041ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools
124752025-03-07T23:30:34.041ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124762025-03-07T23:30:34.041ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124772025-03-07T23:30:34.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124782025-03-07T23:30:34.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124792025-03-07T23:30:34.044ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124802025-03-07T23:30:34.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124812025-03-07T23:30:34.046ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
124822025-03-07T23:30:34.046ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
124832025-03-07T23:30:34.046ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124842025-03-07T23:30:34.047ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124852025-03-07T23:30:34.047ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124862025-03-07T23:30:34.050ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
124872025-03-07T23:30:34.050ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124882025-03-07T23:30:34.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124892025-03-07T23:30:34.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124902025-03-07T23:30:34.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
124912025-03-07T23:30:34.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
124922025-03-07T23:30:34.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124932025-03-07T23:30:34.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124942025-03-07T23:30:34.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
124952025-03-07T23:30:34.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
124962025-03-07T23:30:34.062ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
124972025-03-07T23:30:34.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
124982025-03-07T23:30:34.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
124992025-03-07T23:30:34.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125002025-03-07T23:30:34.077ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
125012025-03-07T23:30:34.077ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125022025-03-07T23:30:34.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125032025-03-07T23:30:34.078ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125042025-03-07T23:30:34.116ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
125052025-03-07T23:30:34.120ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
125062025-03-07T23:30:34.120ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 uri = /v1/system/ip-pools
125072025-03-07T23:30:34.120ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 resource = IpPoolList uri = /v1/system/ip-pools
125082025-03-07T23:30:34.120ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
125092025-03-07T23:30:34.120ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 resource = Database uri = /v1/system/ip-pools
125102025-03-07T23:30:34.120ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
125112025-03-07T23:30:34.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 resource = Database result = Ok(()) uri = /v1/system/ip-pools
125122025-03-07T23:30:34.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
125132025-03-07T23:30:34.130ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 resource = IpPoolList result = Err(Forbidden) uri = /v1/system/ip-pools
125142025-03-07T23:30:34.130ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 89728 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 57582c71-0cf2-405f-bd36-c5dc187c8060 response_code = 403 uri = /v1/system/ip-pools
125152025-03-07T23:30:34.131ZINFOtest_unauthorized (external client test context): client received response status = 403
125162025-03-07T23:30:34.131ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools
125172025-03-07T23:30:34.131ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools
125182025-03-07T23:30:34.131ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 uri = /v1/system/ip-pools
125192025-03-07T23:30:34.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 uri = /v1/system/ip-pools
125202025-03-07T23:30:34.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 uri = /v1/system/ip-pools
125212025-03-07T23:30:34.131ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 uri = /v1/system/ip-pools
125222025-03-07T23:30:34.131ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 resource = IpPoolList uri = /v1/system/ip-pools
125232025-03-07T23:30:34.132ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
125242025-03-07T23:30:34.132ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 resource = IpPoolList result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools
125252025-03-07T23:30:34.132ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 736 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41687bca-d774-4b07-942e-8971cf2395b9 response_code = 401 uri = /v1/system/ip-pools
125262025-03-07T23:30:34.132ZINFOtest_unauthorized (external client test context): client received response status = 401
125272025-03-07T23:30:34.132ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools
125282025-03-07T23:30:34.132ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools
125292025-03-07T23:30:34.132ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 374eda4f-a225-4ea8-bcbc-893f3861269d uri = /v1/system/ip-pools
125302025-03-07T23:30:34.133ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 374eda4f-a225-4ea8-bcbc-893f3861269d uri = /v1/system/ip-pools
125312025-03-07T23:30:34.133ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 374eda4f-a225-4ea8-bcbc-893f3861269d uri = /v1/system/ip-pools
125322025-03-07T23:30:34.133ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 233 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 374eda4f-a225-4ea8-bcbc-893f3861269d response_code = 401 uri = /v1/system/ip-pools
125332025-03-07T23:30:34.133ZINFOtest_unauthorized (external client test context): client received response status = 401
125342025-03-07T23:30:34.133ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools
125352025-03-07T23:30:34.133ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools
125362025-03-07T23:30:34.133ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c1298c05-6d1a-4762-8a07-03eec1bd3241 uri = /v1/system/ip-pools
125372025-03-07T23:30:34.133ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c1298c05-6d1a-4762-8a07-03eec1bd3241 uri = /v1/system/ip-pools
125382025-03-07T23:30:34.135ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1114:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1122:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_create::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c1298c05-6d1a-4762-8a07-03eec1bd3241 uri = /v1/system/ip-pools
125392025-03-07T23:30:34.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1159 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c1298c05-6d1a-4762-8a07-03eec1bd3241 response_code = 401 uri = /v1/system/ip-pools
125402025-03-07T23:30:34.135ZINFOtest_unauthorized (external client test context): client received response status = 401
125412025-03-07T23:30:34.135ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools
125422025-03-07T23:30:34.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools
125432025-03-07T23:30:34.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a280db93-c5e6-4a0c-b94b-a100e5537d93 uri = /v1/system/ip-pools
125442025-03-07T23:30:34.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a280db93-c5e6-4a0c-b94b-a100e5537d93 response_code = 405 uri = /v1/system/ip-pools
125452025-03-07T23:30:34.135ZINFOtest_unauthorized (external client test context): client received response status = 405
125462025-03-07T23:30:34.135ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools
125472025-03-07T23:30:34.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools
125482025-03-07T23:30:34.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4ab82e04-54cb-46d7-9c73-ba8cbe2b3b7f uri = /v1/system/ip-pools
125492025-03-07T23:30:34.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4ab82e04-54cb-46d7-9c73-ba8cbe2b3b7f response_code = 405 uri = /v1/system/ip-pools
125502025-03-07T23:30:34.136ZINFOtest_unauthorized (external client test context): client received response status = 405
125512025-03-07T23:30:34.136ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools
125522025-03-07T23:30:34.136ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools
125532025-03-07T23:30:34.136ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3d40e91a-e92c-4a44-be1f-2690fcf496c5 uri = /v1/system/ip-pools
125542025-03-07T23:30:34.136ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3d40e91a-e92c-4a44-be1f-2690fcf496c5 response_code = 405 uri = /v1/system/ip-pools
125552025-03-07T23:30:34.136ZINFOtest_unauthorized (external client test context): client received response status = 405
125562025-03-07T23:30:34.136ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools
125572025-03-07T23:30:34.136ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools
125582025-03-07T23:30:34.136ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a5871517-dc7e-466f-bc20-1fadf64d9001 uri = /v1/system/ip-pools
125592025-03-07T23:30:34.136ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a5871517-dc7e-466f-bc20-1fadf64d9001 response_code = 405 uri = /v1/system/ip-pools
125602025-03-07T23:30:34.138ZINFOtest_unauthorized (external client test context): client received response status = 405
125612025-03-07T23:30:34.138ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools
125622025-03-07T23:30:34.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools
125632025-03-07T23:30:34.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ecea7902-2da0-4910-919f-b463d276ff7d uri = /v1/system/ip-pools
125642025-03-07T23:30:34.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ecea7902-2da0-4910-919f-b463d276ff7d response_code = 405 uri = /v1/system/ip-pools
125652025-03-07T23:30:34.140ZINFOtest_unauthorized (external client test context): client received response status = 405
125662025-03-07T23:30:34.141ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools
125672025-03-07T23:30:34.141ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools
125682025-03-07T23:30:34.142ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ea83fc0f-d0a5-40fb-86af-08824f631637 uri = /v1/system/ip-pools
125692025-03-07T23:30:34.146ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 4122 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ea83fc0f-d0a5-40fb-86af-08824f631637 response_code = 405 uri = /v1/system/ip-pools
125702025-03-07T23:30:34.146ZINFOtest_unauthorized (external client test context): client received response status = 405
125712025-03-07T23:30:34.146ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools
125722025-03-07T23:30:34.146ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools
125732025-03-07T23:30:34.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2398dc3b-7166-43b6-9337-34d1d7296739 uri = /v1/system/ip-pools
125742025-03-07T23:30:34.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2398dc3b-7166-43b6-9337-34d1d7296739 response_code = 405 uri = /v1/system/ip-pools
125752025-03-07T23:30:34.148ZINFOtest_unauthorized (external client test context): client received response status = 405
125762025-03-07T23:30:34.148ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools
125772025-03-07T23:30:34.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools
125782025-03-07T23:30:34.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70aed9ce-d17d-4193-9a24-cdc8c5354a6f uri = /v1/system/ip-pools
125792025-03-07T23:30:34.150ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70aed9ce-d17d-4193-9a24-cdc8c5354a6f response_code = 405 uri = /v1/system/ip-pools
125802025-03-07T23:30:34.150ZINFOtest_unauthorized (external client test context): client received response status = 405
125812025-03-07T23:30:34.150ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools
125822025-03-07T23:30:34.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools
125832025-03-07T23:30:34.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f uri = /v1/system/ip-pools
125842025-03-07T23:30:34.152ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f uri = /v1/system/ip-pools
125852025-03-07T23:30:34.152ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
125862025-03-07T23:30:34.152ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125872025-03-07T23:30:34.152ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125882025-03-07T23:30:34.155ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125892025-03-07T23:30:34.160ZDEBGtest_unauthorized (results-sink): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
125902025-03-07T23:30:34.160ZDEBGtest_unauthorized (results-sink-cluster): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
125912025-03-07T23:30:34.160ZDEBGtest_unauthorized (clickhouse-client): unrolling 2 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
125922025-03-07T23:30:34.170ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
125932025-03-07T23:30:34.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
125942025-03-07T23:30:34.175ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
125952025-03-07T23:30:34.176ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
125962025-03-07T23:30:34.178ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
125972025-03-07T23:30:34.178ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
125982025-03-07T23:30:34.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
125992025-03-07T23:30:34.190ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
126002025-03-07T23:30:34.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126012025-03-07T23:30:34.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126022025-03-07T23:30:34.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126032025-03-07T23:30:34.193ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = measurements_i64
126042025-03-07T23:30:34.193ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
126052025-03-07T23:30:34.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
126062025-03-07T23:30:34.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126072025-03-07T23:30:34.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126082025-03-07T23:30:34.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126092025-03-07T23:30:34.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
126102025-03-07T23:30:34.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
126112025-03-07T23:30:34.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126122025-03-07T23:30:34.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126132025-03-07T23:30:34.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126142025-03-07T23:30:34.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
126152025-03-07T23:30:34.208ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
126162025-03-07T23:30:34.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126172025-03-07T23:30:34.208ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126182025-03-07T23:30:34.212ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126192025-03-07T23:30:34.219ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
126202025-03-07T23:30:34.219ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126212025-03-07T23:30:34.220ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126222025-03-07T23:30:34.221ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126232025-03-07T23:30:34.227ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
126242025-03-07T23:30:34.232ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
126252025-03-07T23:30:34.233ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f uri = /v1/system/ip-pools
126262025-03-07T23:30:34.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource = IpPoolList uri = /v1/system/ip-pools
126272025-03-07T23:30:34.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
126282025-03-07T23:30:34.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource = Database uri = /v1/system/ip-pools
126292025-03-07T23:30:34.237ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
126302025-03-07T23:30:34.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource = Database result = Ok(()) uri = /v1/system/ip-pools
126312025-03-07T23:30:34.247ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
126322025-03-07T23:30:34.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
126332025-03-07T23:30:34.257ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource = Database uri = /v1/system/ip-pools
126342025-03-07T23:30:34.257ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
126352025-03-07T23:30:34.257ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f resource = Database result = Ok(()) uri = /v1/system/ip-pools
126362025-03-07T23:30:34.264ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
126372025-03-07T23:30:34.266ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 114541 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ce1a060a-d4b5-44b7-afba-eaab290a619f response_code = 200 uri = /v1/system/ip-pools
126382025-03-07T23:30:34.266ZINFOtest_unauthorized (external client test context): client received response status = 200
126392025-03-07T23:30:34.267ZINFOtest_unauthorized: test: begin endpoint url = /v1/ip-pools
126402025-03-07T23:30:34.267ZINFOtest_unauthorized: test: privileged GET url = /v1/ip-pools
126412025-03-07T23:30:34.267ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools
126422025-03-07T23:30:34.267ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e uri = /v1/ip-pools
126432025-03-07T23:30:34.268ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e uri = /v1/ip-pools
126442025-03-07T23:30:34.268ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools
126452025-03-07T23:30:34.268ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126462025-03-07T23:30:34.268ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126472025-03-07T23:30:34.269ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126482025-03-07T23:30:34.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126492025-03-07T23:30:34.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126502025-03-07T23:30:34.272ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126512025-03-07T23:30:34.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
126522025-03-07T23:30:34.284ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
126532025-03-07T23:30:34.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126542025-03-07T23:30:34.284ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126552025-03-07T23:30:34.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126562025-03-07T23:30:34.294ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
126572025-03-07T23:30:34.294ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126582025-03-07T23:30:34.295ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126592025-03-07T23:30:34.295ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126602025-03-07T23:30:34.298ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
126612025-03-07T23:30:34.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
126622025-03-07T23:30:34.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126632025-03-07T23:30:34.314ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126642025-03-07T23:30:34.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126652025-03-07T23:30:34.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
126662025-03-07T23:30:34.324ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
126672025-03-07T23:30:34.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126682025-03-07T23:30:34.325ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126692025-03-07T23:30:34.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126702025-03-07T23:30:34.333ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
126712025-03-07T23:30:34.333ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
126722025-03-07T23:30:34.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
126732025-03-07T23:30:34.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
126742025-03-07T23:30:34.363ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
126752025-03-07T23:30:34.372ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
126762025-03-07T23:30:34.383ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e uri = /v1/ip-pools
126772025-03-07T23:30:34.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/ip-pools
126782025-03-07T23:30:34.383ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/ip-pools
126792025-03-07T23:30:34.383ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Database uri = /v1/ip-pools
126802025-03-07T23:30:34.383ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e roles = RoleSet { roles: {} } uri = /v1/ip-pools
126812025-03-07T23:30:34.384ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Database result = Ok(()) uri = /v1/ip-pools
126822025-03-07T23:30:34.390ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools
126832025-03-07T23:30:34.390ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Database uri = /v1/ip-pools
126842025-03-07T23:30:34.391ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e roles = RoleSet { roles: {} } uri = /v1/ip-pools
126852025-03-07T23:30:34.391ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Database result = Ok(()) uri = /v1/ip-pools
126862025-03-07T23:30:34.400ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools
126872025-03-07T23:30:34.407ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/ip-pools
126882025-03-07T23:30:34.409ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Database uri = /v1/ip-pools
126892025-03-07T23:30:34.409ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e roles = RoleSet { roles: {} } uri = /v1/ip-pools
126902025-03-07T23:30:34.409ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e resource = Database result = Ok(()) uri = /v1/ip-pools
126912025-03-07T23:30:34.421ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 153643 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24e001da-b85f-4d71-aa98-b5c20047a34e response_code = 200 uri = /v1/ip-pools
126922025-03-07T23:30:34.422ZINFOtest_unauthorized (external client test context): client received response status = 200
126932025-03-07T23:30:34.422ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/ip-pools
126942025-03-07T23:30:34.422ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/ip-pools
126952025-03-07T23:30:34.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools
126962025-03-07T23:30:34.422ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 755bee87-ec9b-4520-a6c1-fe98d7f4ae14 uri = /v1/ip-pools
126972025-03-07T23:30:34.422ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 755bee87-ec9b-4520-a6c1-fe98d7f4ae14 uri = /v1/ip-pools
126982025-03-07T23:30:34.422ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 755bee87-ec9b-4520-a6c1-fe98d7f4ae14 uri = /v1/ip-pools
126992025-03-07T23:30:34.422ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 755bee87-ec9b-4520-a6c1-fe98d7f4ae14 uri = /v1/ip-pools
127002025-03-07T23:30:34.422ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing IP pools: Actor required latency_us = 275 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 755bee87-ec9b-4520-a6c1-fe98d7f4ae14 response_code = 401 uri = /v1/ip-pools
127012025-03-07T23:30:34.422ZINFOtest_unauthorized (external client test context): client received response status = 401
127022025-03-07T23:30:34.422ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/ip-pools
127032025-03-07T23:30:34.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools
127042025-03-07T23:30:34.423ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd6c781f-b02b-4fad-8e40-bc75fadd2e9d uri = /v1/ip-pools
127052025-03-07T23:30:34.423ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd6c781f-b02b-4fad-8e40-bc75fadd2e9d uri = /v1/ip-pools
127062025-03-07T23:30:34.423ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd6c781f-b02b-4fad-8e40-bc75fadd2e9d uri = /v1/ip-pools
127072025-03-07T23:30:34.423ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 295 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd6c781f-b02b-4fad-8e40-bc75fadd2e9d response_code = 401 uri = /v1/ip-pools
127082025-03-07T23:30:34.423ZINFOtest_unauthorized (external client test context): client received response status = 401
127092025-03-07T23:30:34.423ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/ip-pools
127102025-03-07T23:30:34.423ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools
127112025-03-07T23:30:34.423ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e6a2f3d-10b1-4e03-8bf8-e13031eec799 uri = /v1/ip-pools
127122025-03-07T23:30:34.424ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e6a2f3d-10b1-4e03-8bf8-e13031eec799 uri = /v1/ip-pools
127132025-03-07T23:30:34.428ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1026:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1046:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e6a2f3d-10b1-4e03-8bf8-e13031eec799 uri = /v1/ip-pools
127142025-03-07T23:30:34.428ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3974 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e6a2f3d-10b1-4e03-8bf8-e13031eec799 response_code = 401 uri = /v1/ip-pools
127152025-03-07T23:30:34.428ZINFOtest_unauthorized (external client test context): client received response status = 401
127162025-03-07T23:30:34.428ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/ip-pools
127172025-03-07T23:30:34.428ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools
127182025-03-07T23:30:34.429ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a979afb7-d968-4eae-a968-b001df36dfcc uri = /v1/ip-pools
127192025-03-07T23:30:34.429ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a979afb7-d968-4eae-a968-b001df36dfcc response_code = 405 uri = /v1/ip-pools
127202025-03-07T23:30:34.429ZINFOtest_unauthorized (external client test context): client received response status = 405
127212025-03-07T23:30:34.429ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/ip-pools
127222025-03-07T23:30:34.429ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools
127232025-03-07T23:30:34.429ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8a3f4de8-6308-478a-a604-b2c42aec729b uri = /v1/ip-pools
127242025-03-07T23:30:34.429ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8a3f4de8-6308-478a-a604-b2c42aec729b response_code = 405 uri = /v1/ip-pools
127252025-03-07T23:30:34.430ZINFOtest_unauthorized (external client test context): client received response status = 405
127262025-03-07T23:30:34.430ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/ip-pools
127272025-03-07T23:30:34.430ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools
127282025-03-07T23:30:34.430ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 56100296-d176-41a8-ba8f-bddb1136b99f uri = /v1/ip-pools
127292025-03-07T23:30:34.430ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 56100296-d176-41a8-ba8f-bddb1136b99f response_code = 405 uri = /v1/ip-pools
127302025-03-07T23:30:34.430ZINFOtest_unauthorized (external client test context): client received response status = 405
127312025-03-07T23:30:34.430ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/ip-pools
127322025-03-07T23:30:34.430ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools
127332025-03-07T23:30:34.430ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c2e559c-3f65-4898-a79a-f055604803db uri = /v1/ip-pools
127342025-03-07T23:30:34.430ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c2e559c-3f65-4898-a79a-f055604803db response_code = 405 uri = /v1/ip-pools
127352025-03-07T23:30:34.431ZINFOtest_unauthorized (external client test context): client received response status = 405
127362025-03-07T23:30:34.431ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/ip-pools
127372025-03-07T23:30:34.431ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools
127382025-03-07T23:30:34.431ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 77375224-aa53-40aa-ad08-ca9ff7427099 uri = /v1/ip-pools
127392025-03-07T23:30:34.431ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 77375224-aa53-40aa-ad08-ca9ff7427099 response_code = 405 uri = /v1/ip-pools
127402025-03-07T23:30:34.431ZINFOtest_unauthorized (external client test context): client received response status = 405
127412025-03-07T23:30:34.431ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/ip-pools
127422025-03-07T23:30:34.431ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools
127432025-03-07T23:30:34.432ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2ca11d-32b8-4034-9d08-779c873393a8 uri = /v1/ip-pools
127442025-03-07T23:30:34.432ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d2ca11d-32b8-4034-9d08-779c873393a8 response_code = 405 uri = /v1/ip-pools
127452025-03-07T23:30:34.432ZINFOtest_unauthorized (external client test context): client received response status = 405
127462025-03-07T23:30:34.432ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/ip-pools
127472025-03-07T23:30:34.432ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools
127482025-03-07T23:30:34.432ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 72579b18-829b-4adc-990b-abd5452a36a2 uri = /v1/ip-pools
127492025-03-07T23:30:34.432ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 72579b18-829b-4adc-990b-abd5452a36a2 response_code = 405 uri = /v1/ip-pools
127502025-03-07T23:30:34.436ZINFOtest_unauthorized (external client test context): client received response status = 405
127512025-03-07T23:30:34.436ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/ip-pools
127522025-03-07T23:30:34.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools
127532025-03-07T23:30:34.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e999e472-f785-45e6-a1d3-92e76902c262 uri = /v1/ip-pools
127542025-03-07T23:30:34.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e999e472-f785-45e6-a1d3-92e76902c262 response_code = 405 uri = /v1/ip-pools
127552025-03-07T23:30:34.437ZINFOtest_unauthorized (external client test context): client received response status = 405
127562025-03-07T23:30:34.437ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/ip-pools
127572025-03-07T23:30:34.437ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools
127582025-03-07T23:30:34.437ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 38903084-c2bf-41b5-9699-ea4156fb0b23 uri = /v1/ip-pools
127592025-03-07T23:30:34.438ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 38903084-c2bf-41b5-9699-ea4156fb0b23 response_code = 405 uri = /v1/ip-pools
127602025-03-07T23:30:34.438ZINFOtest_unauthorized (external client test context): client received response status = 405
127612025-03-07T23:30:34.438ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/ip-pools
127622025-03-07T23:30:34.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools
127632025-03-07T23:30:34.438ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01cedd6d-f7dc-4cc0-93ff-985153623406 uri = /v1/ip-pools
127642025-03-07T23:30:34.438ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01cedd6d-f7dc-4cc0-93ff-985153623406 response_code = 405 uri = /v1/ip-pools
127652025-03-07T23:30:34.438ZINFOtest_unauthorized (external client test context): client received response status = 405
127662025-03-07T23:30:34.438ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/ip-pools
127672025-03-07T23:30:34.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools
127682025-03-07T23:30:34.439ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8b7115d-f172-49f0-adf5-9d7326893076 uri = /v1/ip-pools
127692025-03-07T23:30:34.439ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8b7115d-f172-49f0-adf5-9d7326893076 response_code = 405 uri = /v1/ip-pools
127702025-03-07T23:30:34.439ZINFOtest_unauthorized (external client test context): client received response status = 405
127712025-03-07T23:30:34.439ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/ip-pools
127722025-03-07T23:30:34.439ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools
127732025-03-07T23:30:34.439ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3088a49b-c315-49ad-89ea-7e5818981742 uri = /v1/ip-pools
127742025-03-07T23:30:34.439ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3088a49b-c315-49ad-89ea-7e5818981742 response_code = 405 uri = /v1/ip-pools
127752025-03-07T23:30:34.439ZINFOtest_unauthorized (external client test context): client received response status = 405
127762025-03-07T23:30:34.439ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/ip-pools
127772025-03-07T23:30:34.439ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools
127782025-03-07T23:30:34.440ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b90161a4-c55a-489b-b198-144fd1e3c8c1 uri = /v1/ip-pools
127792025-03-07T23:30:34.440ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b90161a4-c55a-489b-b198-144fd1e3c8c1 response_code = 405 uri = /v1/ip-pools
127802025-03-07T23:30:34.440ZINFOtest_unauthorized (external client test context): client received response status = 405
127812025-03-07T23:30:34.440ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/ip-pools
127822025-03-07T23:30:34.440ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools
127832025-03-07T23:30:34.440ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d0a2c04c-6df6-486b-83de-909a1e828970 uri = /v1/ip-pools
127842025-03-07T23:30:34.440ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d0a2c04c-6df6-486b-83de-909a1e828970 response_code = 405 uri = /v1/ip-pools
127852025-03-07T23:30:34.440ZINFOtest_unauthorized (external client test context): client received response status = 405
127862025-03-07T23:30:34.440ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/ip-pools
127872025-03-07T23:30:34.440ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools
127882025-03-07T23:30:34.441ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9747b68c-a60f-433f-8cc1-58325e1ef2b9 uri = /v1/ip-pools
127892025-03-07T23:30:34.441ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9747b68c-a60f-433f-8cc1-58325e1ef2b9 response_code = 405 uri = /v1/ip-pools
127902025-03-07T23:30:34.441ZINFOtest_unauthorized (external client test context): client received response status = 405
127912025-03-07T23:30:34.441ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/ip-pools
127922025-03-07T23:30:34.441ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools
127932025-03-07T23:30:34.441ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5c8e6bdc-9fb0-43b5-a925-cb8512c7a07b uri = /v1/ip-pools
127942025-03-07T23:30:34.441ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5c8e6bdc-9fb0-43b5-a925-cb8512c7a07b response_code = 405 uri = /v1/ip-pools
127952025-03-07T23:30:34.441ZINFOtest_unauthorized (external client test context): client received response status = 405
127962025-03-07T23:30:34.441ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/ip-pools
127972025-03-07T23:30:34.441ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools
127982025-03-07T23:30:34.442ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c uri = /v1/ip-pools
127992025-03-07T23:30:34.442ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c uri = /v1/ip-pools
128002025-03-07T23:30:34.442ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools
128012025-03-07T23:30:34.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128022025-03-07T23:30:34.442ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128032025-03-07T23:30:34.443ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128042025-03-07T23:30:34.447ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128052025-03-07T23:30:34.449ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128062025-03-07T23:30:34.449ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128072025-03-07T23:30:34.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
128082025-03-07T23:30:34.462ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128092025-03-07T23:30:34.463ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128102025-03-07T23:30:34.463ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128112025-03-07T23:30:34.463ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128122025-03-07T23:30:34.470ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128132025-03-07T23:30:34.470ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128142025-03-07T23:30:34.470ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128152025-03-07T23:30:34.471ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128162025-03-07T23:30:34.479ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128172025-03-07T23:30:34.483ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
128182025-03-07T23:30:34.484ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128192025-03-07T23:30:34.484ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128202025-03-07T23:30:34.484ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128212025-03-07T23:30:34.498ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
128222025-03-07T23:30:34.520ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128232025-03-07T23:30:34.520ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128242025-03-07T23:30:34.520ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128252025-03-07T23:30:34.521ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128262025-03-07T23:30:34.527ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128272025-03-07T23:30:34.536ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128282025-03-07T23:30:34.537ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128292025-03-07T23:30:34.537ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128302025-03-07T23:30:34.540ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128312025-03-07T23:30:34.570ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
128322025-03-07T23:30:34.571ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c uri = /v1/ip-pools
128332025-03-07T23:30:34.571ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/ip-pools
128342025-03-07T23:30:34.571ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/ip-pools
128352025-03-07T23:30:34.572ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Database uri = /v1/ip-pools
128362025-03-07T23:30:34.572ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c roles = RoleSet { roles: {} } uri = /v1/ip-pools
128372025-03-07T23:30:34.573ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Database result = Ok(()) uri = /v1/ip-pools
128382025-03-07T23:30:34.573ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
128392025-03-07T23:30:34.574ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
128402025-03-07T23:30:34.576ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools
128412025-03-07T23:30:34.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Database uri = /v1/ip-pools
128422025-03-07T23:30:34.577ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c roles = RoleSet { roles: {} } uri = /v1/ip-pools
128432025-03-07T23:30:34.596ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Database result = Ok(()) uri = /v1/ip-pools
128442025-03-07T23:30:34.597ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
128452025-03-07T23:30:34.599ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
128462025-03-07T23:30:34.599ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
128472025-03-07T23:30:34.599ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
128482025-03-07T23:30:34.602ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools
128492025-03-07T23:30:34.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/ip-pools
128502025-03-07T23:30:34.609ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Database uri = /v1/ip-pools
128512025-03-07T23:30:34.609ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c roles = RoleSet { roles: {} } uri = /v1/ip-pools
128522025-03-07T23:30:34.610ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c resource = Database result = Ok(()) uri = /v1/ip-pools
128532025-03-07T23:30:34.617ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 175884 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d8ede0d-a855-407f-b5ca-6d32d8e5444c response_code = 200 uri = /v1/ip-pools
128542025-03-07T23:30:34.618ZINFOtest_unauthorized (external client test context): client received response status = 200
128552025-03-07T23:30:34.619ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default
128562025-03-07T23:30:34.619ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default
128572025-03-07T23:30:34.619ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default
128582025-03-07T23:30:34.619ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e uri = /v1/system/ip-pools/default
128592025-03-07T23:30:34.619ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e uri = /v1/system/ip-pools/default
128602025-03-07T23:30:34.619ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default
128612025-03-07T23:30:34.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128622025-03-07T23:30:34.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128632025-03-07T23:30:34.621ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128642025-03-07T23:30:34.629ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128652025-03-07T23:30:34.629ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128662025-03-07T23:30:34.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128672025-03-07T23:30:34.649ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
128682025-03-07T23:30:34.649ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128692025-03-07T23:30:34.649ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128702025-03-07T23:30:34.649ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128712025-03-07T23:30:34.650ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128722025-03-07T23:30:34.658ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
128732025-03-07T23:30:34.658ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
128742025-03-07T23:30:34.658ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
128752025-03-07T23:30:34.658ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
128762025-03-07T23:30:34.658ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
128772025-03-07T23:30:34.658ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
128782025-03-07T23:30:34.658ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
128792025-03-07T23:30:34.659ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
128802025-03-07T23:30:34.659ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
128812025-03-07T23:30:34.659ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128822025-03-07T23:30:34.659ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128832025-03-07T23:30:34.659ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128842025-03-07T23:30:34.660ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128852025-03-07T23:30:34.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
128862025-03-07T23:30:34.667ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
128872025-03-07T23:30:34.667ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128882025-03-07T23:30:34.667ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128892025-03-07T23:30:34.668ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128902025-03-07T23:30:34.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
128912025-03-07T23:30:34.678ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
128922025-03-07T23:30:34.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128932025-03-07T23:30:34.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128942025-03-07T23:30:34.678ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128952025-03-07T23:30:34.688ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
128962025-03-07T23:30:34.688ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
128972025-03-07T23:30:34.688ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
128982025-03-07T23:30:34.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
128992025-03-07T23:30:34.697ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
129002025-03-07T23:30:34.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
129012025-03-07T23:30:34.701ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e uri = /v1/system/ip-pools/default
129022025-03-07T23:30:34.701ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource = Database uri = /v1/system/ip-pools/default
129032025-03-07T23:30:34.701ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129042025-03-07T23:30:34.702ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
129052025-03-07T23:30:34.705ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
129062025-03-07T23:30:34.705ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
129072025-03-07T23:30:34.705ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource = Database uri = /v1/system/ip-pools/default
129082025-03-07T23:30:34.705ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129092025-03-07T23:30:34.706ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
129102025-03-07T23:30:34.713ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default
129112025-03-07T23:30:34.721ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default
129122025-03-07T23:30:34.721ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 101994 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8b26643-74c8-470f-9594-f08247243f2e response_code = 200 uri = /v1/system/ip-pools/default
129132025-03-07T23:30:34.722ZINFOtest_unauthorized (external client test context): client received response status = 200
129142025-03-07T23:30:34.722ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default
129152025-03-07T23:30:34.722ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default
129162025-03-07T23:30:34.722ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba uri = /v1/system/ip-pools/default
129172025-03-07T23:30:34.723ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba uri = /v1/system/ip-pools/default
129182025-03-07T23:30:34.723ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default
129192025-03-07T23:30:34.723ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129202025-03-07T23:30:34.723ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129212025-03-07T23:30:34.724ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129222025-03-07T23:30:34.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129232025-03-07T23:30:34.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129242025-03-07T23:30:34.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129252025-03-07T23:30:34.738ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
129262025-03-07T23:30:34.738ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
129272025-03-07T23:30:34.738ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129282025-03-07T23:30:34.738ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129292025-03-07T23:30:34.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129302025-03-07T23:30:34.745ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
129312025-03-07T23:30:34.745ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129322025-03-07T23:30:34.745ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129332025-03-07T23:30:34.746ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129342025-03-07T23:30:34.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
129352025-03-07T23:30:34.771ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
129362025-03-07T23:30:34.771ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129372025-03-07T23:30:34.771ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129382025-03-07T23:30:34.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129392025-03-07T23:30:34.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
129402025-03-07T23:30:34.779ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
129412025-03-07T23:30:34.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129422025-03-07T23:30:34.779ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129432025-03-07T23:30:34.779ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129442025-03-07T23:30:34.788ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
129452025-03-07T23:30:34.788ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129462025-03-07T23:30:34.788ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129472025-03-07T23:30:34.789ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129482025-03-07T23:30:34.798ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
129492025-03-07T23:30:34.803ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
129502025-03-07T23:30:34.803ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba uri = /v1/system/ip-pools/default
129512025-03-07T23:30:34.803ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource = Database uri = /v1/system/ip-pools/default
129522025-03-07T23:30:34.803ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129532025-03-07T23:30:34.803ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
129542025-03-07T23:30:34.810ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
129552025-03-07T23:30:34.811ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
129562025-03-07T23:30:34.811ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource = Database uri = /v1/system/ip-pools/default
129572025-03-07T23:30:34.811ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129582025-03-07T23:30:34.811ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
129592025-03-07T23:30:34.815ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129602025-03-07T23:30:34.822ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default
129612025-03-07T23:30:34.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 99540 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63c4aa0f-2144-4213-bf44-fe9dd7688eba response_code = 404 uri = /v1/system/ip-pools/default
129622025-03-07T23:30:34.828ZINFOtest_unauthorized (external client test context): client received response status = 404
129632025-03-07T23:30:34.830ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default
129642025-03-07T23:30:34.830ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default
129652025-03-07T23:30:34.831ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 uri = /v1/system/ip-pools/default
129662025-03-07T23:30:34.833ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 uri = /v1/system/ip-pools/default
129672025-03-07T23:30:34.833ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 uri = /v1/system/ip-pools/default
129682025-03-07T23:30:34.833ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 uri = /v1/system/ip-pools/default
129692025-03-07T23:30:34.833ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 resource = Database uri = /v1/system/ip-pools/default
129702025-03-07T23:30:34.833ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
129712025-03-07T23:30:34.834ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default
129722025-03-07T23:30:34.834ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 2688 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bece0b77-6e26-43f7-bcdc-dcc3d81179a3 response_code = 401 uri = /v1/system/ip-pools/default
129732025-03-07T23:30:34.834ZINFOtest_unauthorized (external client test context): client received response status = 401
129742025-03-07T23:30:34.834ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default
129752025-03-07T23:30:34.834ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default
129762025-03-07T23:30:34.835ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 169e1cb1-0ef0-4bcf-a27b-d5cc6cf55f89 uri = /v1/system/ip-pools/default
129772025-03-07T23:30:34.835ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 169e1cb1-0ef0-4bcf-a27b-d5cc6cf55f89 uri = /v1/system/ip-pools/default
129782025-03-07T23:30:34.835ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 169e1cb1-0ef0-4bcf-a27b-d5cc6cf55f89 uri = /v1/system/ip-pools/default
129792025-03-07T23:30:34.835ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 247 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 169e1cb1-0ef0-4bcf-a27b-d5cc6cf55f89 response_code = 401 uri = /v1/system/ip-pools/default
129802025-03-07T23:30:34.835ZINFOtest_unauthorized (external client test context): client received response status = 401
129812025-03-07T23:30:34.835ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default
129822025-03-07T23:30:34.835ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default
129832025-03-07T23:30:34.835ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2dcafb27-6b76-44a7-bf26-797d8c948ea4 uri = /v1/system/ip-pools/default
129842025-03-07T23:30:34.835ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2dcafb27-6b76-44a7-bf26-797d8c948ea4 uri = /v1/system/ip-pools/default
129852025-03-07T23:30:34.837ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1132:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1145:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2dcafb27-6b76-44a7-bf26-797d8c948ea4 uri = /v1/system/ip-pools/default
129862025-03-07T23:30:34.837ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1257 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2dcafb27-6b76-44a7-bf26-797d8c948ea4 response_code = 401 uri = /v1/system/ip-pools/default
129872025-03-07T23:30:34.837ZINFOtest_unauthorized (external client test context): client received response status = 401
129882025-03-07T23:30:34.837ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default
129892025-03-07T23:30:34.837ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default
129902025-03-07T23:30:34.837ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 uri = /v1/system/ip-pools/default
129912025-03-07T23:30:34.838ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 uri = /v1/system/ip-pools/default
129922025-03-07T23:30:34.838ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default
129932025-03-07T23:30:34.838ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129942025-03-07T23:30:34.838ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129952025-03-07T23:30:34.839ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129962025-03-07T23:30:34.850ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
129972025-03-07T23:30:34.850ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
129982025-03-07T23:30:34.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
129992025-03-07T23:30:34.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
130002025-03-07T23:30:34.869ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
130012025-03-07T23:30:34.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130022025-03-07T23:30:34.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130032025-03-07T23:30:34.871ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130042025-03-07T23:30:34.876ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
130052025-03-07T23:30:34.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130062025-03-07T23:30:34.877ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130072025-03-07T23:30:34.877ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130082025-03-07T23:30:34.882ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
130092025-03-07T23:30:34.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
130102025-03-07T23:30:34.887ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130112025-03-07T23:30:34.887ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130122025-03-07T23:30:34.888ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130132025-03-07T23:30:34.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
130142025-03-07T23:30:34.893ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
130152025-03-07T23:30:34.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130162025-03-07T23:30:34.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130172025-03-07T23:30:34.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130182025-03-07T23:30:34.896ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
130192025-03-07T23:30:34.896ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130202025-03-07T23:30:34.896ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130212025-03-07T23:30:34.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130222025-03-07T23:30:34.899ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
130232025-03-07T23:30:34.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
130242025-03-07T23:30:34.903ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 uri = /v1/system/ip-pools/default
130252025-03-07T23:30:34.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource = Database uri = /v1/system/ip-pools/default
130262025-03-07T23:30:34.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130272025-03-07T23:30:34.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
130282025-03-07T23:30:34.911ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
130292025-03-07T23:30:34.911ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
130302025-03-07T23:30:34.911ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource = Database uri = /v1/system/ip-pools/default
130312025-03-07T23:30:34.911ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130322025-03-07T23:30:34.913ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
130332025-03-07T23:30:34.916ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130342025-03-07T23:30:34.932ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default
130352025-03-07T23:30:34.933ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 95347 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a837ce7c-5d2d-4c0f-86d7-f1e6540d68a3 response_code = 404 uri = /v1/system/ip-pools/default
130362025-03-07T23:30:34.934ZINFOtest_unauthorized (external client test context): client received response status = 404
130372025-03-07T23:30:34.935ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default
130382025-03-07T23:30:34.935ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130392025-03-07T23:30:34.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 uri = /v1/system/ip-pools/default
130402025-03-07T23:30:34.935ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 uri = /v1/system/ip-pools/default
130412025-03-07T23:30:34.935ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 uri = /v1/system/ip-pools/default
130422025-03-07T23:30:34.935ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 uri = /v1/system/ip-pools/default
130432025-03-07T23:30:34.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 resource = Database uri = /v1/system/ip-pools/default
130442025-03-07T23:30:34.935ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
130452025-03-07T23:30:34.936ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default
130462025-03-07T23:30:34.936ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 953 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 513cd2f9-b845-4202-9eb3-bf64bcdaccc5 response_code = 401 uri = /v1/system/ip-pools/default
130472025-03-07T23:30:34.936ZINFOtest_unauthorized (external client test context): client received response status = 401
130482025-03-07T23:30:34.936ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default
130492025-03-07T23:30:34.937ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130502025-03-07T23:30:34.937ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9ea5e015-0ae7-4a8d-8214-bfe05fe21f24 uri = /v1/system/ip-pools/default
130512025-03-07T23:30:34.937ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9ea5e015-0ae7-4a8d-8214-bfe05fe21f24 uri = /v1/system/ip-pools/default
130522025-03-07T23:30:34.937ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9ea5e015-0ae7-4a8d-8214-bfe05fe21f24 uri = /v1/system/ip-pools/default
130532025-03-07T23:30:34.937ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 557 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9ea5e015-0ae7-4a8d-8214-bfe05fe21f24 response_code = 401 uri = /v1/system/ip-pools/default
130542025-03-07T23:30:34.938ZINFOtest_unauthorized (external client test context): client received response status = 401
130552025-03-07T23:30:34.938ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default
130562025-03-07T23:30:34.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130572025-03-07T23:30:34.938ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dbcfc460-ebc1-4415-9b04-9721ebfc8f1a uri = /v1/system/ip-pools/default
130582025-03-07T23:30:34.939ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dbcfc460-ebc1-4415-9b04-9721ebfc8f1a uri = /v1/system/ip-pools/default
130592025-03-07T23:30:34.944ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1177:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1190:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dbcfc460-ebc1-4415-9b04-9721ebfc8f1a uri = /v1/system/ip-pools/default
130602025-03-07T23:30:34.944ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5951 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dbcfc460-ebc1-4415-9b04-9721ebfc8f1a response_code = 401 uri = /v1/system/ip-pools/default
130612025-03-07T23:30:34.945ZINFOtest_unauthorized (external client test context): client received response status = 401
130622025-03-07T23:30:34.945ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default
130632025-03-07T23:30:34.945ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130642025-03-07T23:30:34.945ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f332a17e-c5ca-4a75-9961-4aa200cc4f86 uri = /v1/system/ip-pools/default
130652025-03-07T23:30:34.945ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 129 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f332a17e-c5ca-4a75-9961-4aa200cc4f86 response_code = 405 uri = /v1/system/ip-pools/default
130662025-03-07T23:30:34.945ZINFOtest_unauthorized (external client test context): client received response status = 405
130672025-03-07T23:30:34.945ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default
130682025-03-07T23:30:34.945ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130692025-03-07T23:30:34.946ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e209564e-6df8-4d38-8873-b72dc6279158 uri = /v1/system/ip-pools/default
130702025-03-07T23:30:34.946ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 145 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e209564e-6df8-4d38-8873-b72dc6279158 response_code = 405 uri = /v1/system/ip-pools/default
130712025-03-07T23:30:34.946ZINFOtest_unauthorized (external client test context): client received response status = 405
130722025-03-07T23:30:34.946ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default
130732025-03-07T23:30:34.947ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130742025-03-07T23:30:34.947ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3d2fe37-bf22-4297-922e-842dae2e1e26 uri = /v1/system/ip-pools/default
130752025-03-07T23:30:34.947ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 210 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3d2fe37-bf22-4297-922e-842dae2e1e26 response_code = 405 uri = /v1/system/ip-pools/default
130762025-03-07T23:30:34.948ZINFOtest_unauthorized (external client test context): client received response status = 405
130772025-03-07T23:30:34.948ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default
130782025-03-07T23:30:34.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130792025-03-07T23:30:34.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0b0b3a6b-eab7-4fec-957b-d0f9c805a646 uri = /v1/system/ip-pools/default
130802025-03-07T23:30:34.955ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 305 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0b0b3a6b-eab7-4fec-957b-d0f9c805a646 response_code = 405 uri = /v1/system/ip-pools/default
130812025-03-07T23:30:34.955ZINFOtest_unauthorized (external client test context): client received response status = 405
130822025-03-07T23:30:34.955ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default
130832025-03-07T23:30:34.955ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
130842025-03-07T23:30:34.955ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a uri = /v1/system/ip-pools/default
130852025-03-07T23:30:34.955ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a uri = /v1/system/ip-pools/default
130862025-03-07T23:30:34.955ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default
130872025-03-07T23:30:34.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130882025-03-07T23:30:34.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130892025-03-07T23:30:34.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130902025-03-07T23:30:34.960ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130912025-03-07T23:30:34.960ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130922025-03-07T23:30:34.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130932025-03-07T23:30:34.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
130942025-03-07T23:30:34.966ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
130952025-03-07T23:30:34.966ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
130962025-03-07T23:30:34.966ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
130972025-03-07T23:30:34.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
130982025-03-07T23:30:34.966ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
130992025-03-07T23:30:34.966ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131002025-03-07T23:30:34.966ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131012025-03-07T23:30:34.967ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131022025-03-07T23:30:34.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
131032025-03-07T23:30:34.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
131042025-03-07T23:30:34.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131052025-03-07T23:30:34.974ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131062025-03-07T23:30:34.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131072025-03-07T23:30:34.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
131082025-03-07T23:30:34.978ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
131092025-03-07T23:30:34.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131102025-03-07T23:30:34.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131112025-03-07T23:30:34.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131122025-03-07T23:30:34.987ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
131132025-03-07T23:30:34.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131142025-03-07T23:30:34.988ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131152025-03-07T23:30:34.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131162025-03-07T23:30:34.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
131172025-03-07T23:30:35.005ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
131182025-03-07T23:30:35.005ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a uri = /v1/system/ip-pools/default
131192025-03-07T23:30:35.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource = Database uri = /v1/system/ip-pools/default
131202025-03-07T23:30:35.005ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
131212025-03-07T23:30:35.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
131222025-03-07T23:30:35.012ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
131232025-03-07T23:30:35.013ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
131242025-03-07T23:30:35.013ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource = Database uri = /v1/system/ip-pools/default
131252025-03-07T23:30:35.013ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
131262025-03-07T23:30:35.014ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
131272025-03-07T23:30:35.026ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
131282025-03-07T23:30:35.050ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default
131292025-03-07T23:30:35.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 101090 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 99a110b1-6480-4329-8a33-d0fa88542d1a response_code = 404 uri = /v1/system/ip-pools/default
131302025-03-07T23:30:35.051ZINFOtest_unauthorized (external client test context): client received response status = 404
131312025-03-07T23:30:35.051ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default
131322025-03-07T23:30:35.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131332025-03-07T23:30:35.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 uri = /v1/system/ip-pools/default
131342025-03-07T23:30:35.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 uri = /v1/system/ip-pools/default
131352025-03-07T23:30:35.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 uri = /v1/system/ip-pools/default
131362025-03-07T23:30:35.052ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 uri = /v1/system/ip-pools/default
131372025-03-07T23:30:35.052ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 resource = Database uri = /v1/system/ip-pools/default
131382025-03-07T23:30:35.052ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
131392025-03-07T23:30:35.052ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default
131402025-03-07T23:30:35.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 795 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f5f2e86f-107c-431b-af57-2c8a3782f143 response_code = 401 uri = /v1/system/ip-pools/default
131412025-03-07T23:30:35.053ZINFOtest_unauthorized (external client test context): client received response status = 401
131422025-03-07T23:30:35.053ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default
131432025-03-07T23:30:35.053ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131442025-03-07T23:30:35.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f15a71c-4524-46d3-a4ac-123e804c6458 uri = /v1/system/ip-pools/default
131452025-03-07T23:30:35.053ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f15a71c-4524-46d3-a4ac-123e804c6458 uri = /v1/system/ip-pools/default
131462025-03-07T23:30:35.053ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f15a71c-4524-46d3-a4ac-123e804c6458 uri = /v1/system/ip-pools/default
131472025-03-07T23:30:35.053ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 229 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f15a71c-4524-46d3-a4ac-123e804c6458 response_code = 401 uri = /v1/system/ip-pools/default
131482025-03-07T23:30:35.053ZINFOtest_unauthorized (external client test context): client received response status = 401
131492025-03-07T23:30:35.053ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default
131502025-03-07T23:30:35.053ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131512025-03-07T23:30:35.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 21565152-6079-48bf-8773-84a9240ec6f9 uri = /v1/system/ip-pools/default
131522025-03-07T23:30:35.053ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 21565152-6079-48bf-8773-84a9240ec6f9 uri = /v1/system/ip-pools/default
131532025-03-07T23:30:35.055ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1155:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1166:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 21565152-6079-48bf-8773-84a9240ec6f9 uri = /v1/system/ip-pools/default
131542025-03-07T23:30:35.055ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1091 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 21565152-6079-48bf-8773-84a9240ec6f9 response_code = 401 uri = /v1/system/ip-pools/default
131552025-03-07T23:30:35.055ZINFOtest_unauthorized (external client test context): client received response status = 401
131562025-03-07T23:30:35.055ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default
131572025-03-07T23:30:35.055ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131582025-03-07T23:30:35.055ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cb3d171c-5f93-4b22-bf59-51f1a8838c0a uri = /v1/system/ip-pools/default
131592025-03-07T23:30:35.055ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cb3d171c-5f93-4b22-bf59-51f1a8838c0a response_code = 405 uri = /v1/system/ip-pools/default
131602025-03-07T23:30:35.055ZINFOtest_unauthorized (external client test context): client received response status = 405
131612025-03-07T23:30:35.055ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default
131622025-03-07T23:30:35.055ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131632025-03-07T23:30:35.055ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1df5af95-bf95-4298-8293-0622d8a6f5a9 uri = /v1/system/ip-pools/default
131642025-03-07T23:30:35.056ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1df5af95-bf95-4298-8293-0622d8a6f5a9 response_code = 405 uri = /v1/system/ip-pools/default
131652025-03-07T23:30:35.056ZINFOtest_unauthorized (external client test context): client received response status = 405
131662025-03-07T23:30:35.056ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default
131672025-03-07T23:30:35.056ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131682025-03-07T23:30:35.056ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 435c8d4b-d901-4b6a-96d9-6a888353fcd9 uri = /v1/system/ip-pools/default
131692025-03-07T23:30:35.056ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 435c8d4b-d901-4b6a-96d9-6a888353fcd9 response_code = 405 uri = /v1/system/ip-pools/default
131702025-03-07T23:30:35.056ZINFOtest_unauthorized (external client test context): client received response status = 405
131712025-03-07T23:30:35.056ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default
131722025-03-07T23:30:35.056ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131732025-03-07T23:30:35.057ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5c165c4b-9376-49ba-97ad-1ff695802285 uri = /v1/system/ip-pools/default
131742025-03-07T23:30:35.057ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5c165c4b-9376-49ba-97ad-1ff695802285 response_code = 405 uri = /v1/system/ip-pools/default
131752025-03-07T23:30:35.057ZINFOtest_unauthorized (external client test context): client received response status = 405
131762025-03-07T23:30:35.057ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default
131772025-03-07T23:30:35.057ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default
131782025-03-07T23:30:35.057ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 uri = /v1/system/ip-pools/default
131792025-03-07T23:30:35.057ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 uri = /v1/system/ip-pools/default
131802025-03-07T23:30:35.057ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default
131812025-03-07T23:30:35.057ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131822025-03-07T23:30:35.057ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131832025-03-07T23:30:35.058ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131842025-03-07T23:30:35.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131852025-03-07T23:30:35.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131862025-03-07T23:30:35.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131872025-03-07T23:30:35.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
131882025-03-07T23:30:35.063ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
131892025-03-07T23:30:35.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131902025-03-07T23:30:35.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131912025-03-07T23:30:35.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131922025-03-07T23:30:35.069ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
131932025-03-07T23:30:35.069ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131942025-03-07T23:30:35.069ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
131952025-03-07T23:30:35.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
131962025-03-07T23:30:35.072ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
131972025-03-07T23:30:35.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
131982025-03-07T23:30:35.076ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
131992025-03-07T23:30:35.076ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132002025-03-07T23:30:35.077ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132012025-03-07T23:30:35.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
132022025-03-07T23:30:35.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
132032025-03-07T23:30:35.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132042025-03-07T23:30:35.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132052025-03-07T23:30:35.080ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132062025-03-07T23:30:35.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
132072025-03-07T23:30:35.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132082025-03-07T23:30:35.081ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132092025-03-07T23:30:35.082ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132102025-03-07T23:30:35.084ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
132112025-03-07T23:30:35.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
132122025-03-07T23:30:35.087ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 uri = /v1/system/ip-pools/default
132132025-03-07T23:30:35.087ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource = Database uri = /v1/system/ip-pools/default
132142025-03-07T23:30:35.087ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
132152025-03-07T23:30:35.088ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
132162025-03-07T23:30:35.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default
132172025-03-07T23:30:35.090ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default
132182025-03-07T23:30:35.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource = Database uri = /v1/system/ip-pools/default
132192025-03-07T23:30:35.090ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default
132202025-03-07T23:30:35.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default
132212025-03-07T23:30:35.093ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default
132222025-03-07T23:30:35.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default
132232025-03-07T23:30:35.105ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 48182 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5c758a9b-5892-4d58-a304-2459c2fa0672 response_code = 200 uri = /v1/system/ip-pools/default
132242025-03-07T23:30:35.106ZINFOtest_unauthorized (external client test context): client received response status = 200
132252025-03-07T23:30:35.106ZINFOtest_unauthorized: test: begin endpoint url = /v1/ip-pools/default?project=demo-project
132262025-03-07T23:30:35.106ZINFOtest_unauthorized: test: privileged GET url = /v1/ip-pools/default?project=demo-project
132272025-03-07T23:30:35.106ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
132282025-03-07T23:30:35.106ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 uri = /v1/ip-pools/default?project=demo-project
132292025-03-07T23:30:35.107ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 uri = /v1/ip-pools/default?project=demo-project
132302025-03-07T23:30:35.107ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools/default?project=demo-project
132312025-03-07T23:30:35.107ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132322025-03-07T23:30:35.107ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132332025-03-07T23:30:35.108ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132342025-03-07T23:30:35.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132352025-03-07T23:30:35.116ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132362025-03-07T23:30:35.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132372025-03-07T23:30:35.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
132382025-03-07T23:30:35.130ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
132392025-03-07T23:30:35.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132402025-03-07T23:30:35.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132412025-03-07T23:30:35.133ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132422025-03-07T23:30:35.139ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
132432025-03-07T23:30:35.139ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132442025-03-07T23:30:35.139ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132452025-03-07T23:30:35.140ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132462025-03-07T23:30:35.142ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
132472025-03-07T23:30:35.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
132482025-03-07T23:30:35.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132492025-03-07T23:30:35.148ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132502025-03-07T23:30:35.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132512025-03-07T23:30:35.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
132522025-03-07T23:30:35.151ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
132532025-03-07T23:30:35.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132542025-03-07T23:30:35.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132552025-03-07T23:30:35.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132562025-03-07T23:30:35.154ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
132572025-03-07T23:30:35.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
132582025-03-07T23:30:35.154ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
132592025-03-07T23:30:35.155ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
132602025-03-07T23:30:35.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
132612025-03-07T23:30:35.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
132622025-03-07T23:30:35.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
132632025-03-07T23:30:35.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
132642025-03-07T23:30:35.166ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 uri = /v1/ip-pools/default?project=demo-project
132652025-03-07T23:30:35.166ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = Database uri = /v1/ip-pools/default?project=demo-project
132662025-03-07T23:30:35.166ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
132672025-03-07T23:30:35.167ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
132682025-03-07T23:30:35.168ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
132692025-03-07T23:30:35.170ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
132702025-03-07T23:30:35.174ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/ip-pools/default?project=demo-project
132712025-03-07T23:30:35.175ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools/default?project=demo-project
132722025-03-07T23:30:35.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = Database uri = /v1/ip-pools/default?project=demo-project
132732025-03-07T23:30:35.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
132742025-03-07T23:30:35.178ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
132752025-03-07T23:30:35.186ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
132762025-03-07T23:30:35.186ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
132772025-03-07T23:30:35.187ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools/default?project=demo-project
132782025-03-07T23:30:35.194ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
132792025-03-07T23:30:35.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = Database uri = /v1/ip-pools/default?project=demo-project
132802025-03-07T23:30:35.194ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
132812025-03-07T23:30:35.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
132822025-03-07T23:30:35.204ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
132832025-03-07T23:30:35.204ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
132842025-03-07T23:30:35.207ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 100495 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a6bf603-db80-40e7-bba7-a406271a9180 response_code = 200 uri = /v1/ip-pools/default?project=demo-project
132852025-03-07T23:30:35.208ZINFOtest_unauthorized (external client test context): client received response status = 200
132862025-03-07T23:30:35.208ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/ip-pools/default?project=demo-project
132872025-03-07T23:30:35.208ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/ip-pools/default?project=demo-project
132882025-03-07T23:30:35.208ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
132892025-03-07T23:30:35.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 uri = /v1/ip-pools/default?project=demo-project
132902025-03-07T23:30:35.209ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 uri = /v1/ip-pools/default?project=demo-project
132912025-03-07T23:30:35.209ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 uri = /v1/ip-pools/default?project=demo-project
132922025-03-07T23:30:35.209ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 uri = /v1/ip-pools/default?project=demo-project
132932025-03-07T23:30:35.209ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 resource = Database uri = /v1/ip-pools/default?project=demo-project
132942025-03-07T23:30:35.209ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
132952025-03-07T23:30:35.210ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/ip-pools/default?project=demo-project
132962025-03-07T23:30:35.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1363 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1801a88c-8a01-49ee-91ba-408f84ce4969 response_code = 401 uri = /v1/ip-pools/default?project=demo-project
132972025-03-07T23:30:35.210ZINFOtest_unauthorized (external client test context): client received response status = 401
132982025-03-07T23:30:35.211ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/ip-pools/default?project=demo-project
132992025-03-07T23:30:35.211ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133002025-03-07T23:30:35.211ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f116e7f-71c3-4448-86cb-a12505e6820d uri = /v1/ip-pools/default?project=demo-project
133012025-03-07T23:30:35.211ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f116e7f-71c3-4448-86cb-a12505e6820d uri = /v1/ip-pools/default?project=demo-project
133022025-03-07T23:30:35.211ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f116e7f-71c3-4448-86cb-a12505e6820d uri = /v1/ip-pools/default?project=demo-project
133032025-03-07T23:30:35.211ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 440 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f116e7f-71c3-4448-86cb-a12505e6820d response_code = 401 uri = /v1/ip-pools/default?project=demo-project
133042025-03-07T23:30:35.212ZINFOtest_unauthorized (external client test context): client received response status = 401
133052025-03-07T23:30:35.213ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/ip-pools/default?project=demo-project
133062025-03-07T23:30:35.213ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133072025-03-07T23:30:35.213ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = be27655c-8d9d-461f-94a3-23b51c58b9bf uri = /v1/ip-pools/default?project=demo-project
133082025-03-07T23:30:35.213ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = be27655c-8d9d-461f-94a3-23b51c58b9bf uri = /v1/ip-pools/default?project=demo-project
133092025-03-07T23:30:35.216ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1056:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloIpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1070:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloIpPool>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_ip_pool_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloIpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = be27655c-8d9d-461f-94a3-23b51c58b9bf uri = /v1/ip-pools/default?project=demo-project
133102025-03-07T23:30:35.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3652 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = be27655c-8d9d-461f-94a3-23b51c58b9bf response_code = 401 uri = /v1/ip-pools/default?project=demo-project
133112025-03-07T23:30:35.217ZINFOtest_unauthorized (external client test context): client received response status = 401
133122025-03-07T23:30:35.217ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/ip-pools/default?project=demo-project
133132025-03-07T23:30:35.217ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133142025-03-07T23:30:35.218ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fd686bf7-39a5-4729-8aca-32cdbdbc3014 uri = /v1/ip-pools/default?project=demo-project
133152025-03-07T23:30:35.218ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 169 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fd686bf7-39a5-4729-8aca-32cdbdbc3014 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133162025-03-07T23:30:35.219ZINFOtest_unauthorized (external client test context): client received response status = 405
133172025-03-07T23:30:35.219ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/ip-pools/default?project=demo-project
133182025-03-07T23:30:35.219ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133192025-03-07T23:30:35.219ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 15472a7d-23f0-4eab-92c7-c7de4b9767be uri = /v1/ip-pools/default?project=demo-project
133202025-03-07T23:30:35.220ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 191 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 15472a7d-23f0-4eab-92c7-c7de4b9767be response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133212025-03-07T23:30:35.220ZINFOtest_unauthorized (external client test context): client received response status = 405
133222025-03-07T23:30:35.221ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/ip-pools/default?project=demo-project
133232025-03-07T23:30:35.222ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133242025-03-07T23:30:35.222ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a001a2bf-d376-4178-bb7c-bf4bc2214c26 uri = /v1/ip-pools/default?project=demo-project
133252025-03-07T23:30:35.222ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 180 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a001a2bf-d376-4178-bb7c-bf4bc2214c26 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133262025-03-07T23:30:35.222ZINFOtest_unauthorized (external client test context): client received response status = 405
133272025-03-07T23:30:35.223ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/ip-pools/default?project=demo-project
133282025-03-07T23:30:35.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133292025-03-07T23:30:35.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 63565ced-c2a9-499f-9e89-f2758fd807ed uri = /v1/ip-pools/default?project=demo-project
133302025-03-07T23:30:35.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 172 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 63565ced-c2a9-499f-9e89-f2758fd807ed response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133312025-03-07T23:30:35.224ZINFOtest_unauthorized (external client test context): client received response status = 405
133322025-03-07T23:30:35.224ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/ip-pools/default?project=demo-project
133332025-03-07T23:30:35.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133342025-03-07T23:30:35.225ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e89692cd-12a4-44ad-a3b4-200248aeb5a0 uri = /v1/ip-pools/default?project=demo-project
133352025-03-07T23:30:35.225ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e89692cd-12a4-44ad-a3b4-200248aeb5a0 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133362025-03-07T23:30:35.225ZINFOtest_unauthorized (external client test context): client received response status = 405
133372025-03-07T23:30:35.225ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/ip-pools/default?project=demo-project
133382025-03-07T23:30:35.225ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133392025-03-07T23:30:35.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d575548-6eae-4892-9583-c1e21cc098d7 uri = /v1/ip-pools/default?project=demo-project
133402025-03-07T23:30:35.226ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 148 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4d575548-6eae-4892-9583-c1e21cc098d7 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133412025-03-07T23:30:35.226ZINFOtest_unauthorized (external client test context): client received response status = 405
133422025-03-07T23:30:35.226ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/ip-pools/default?project=demo-project
133432025-03-07T23:30:35.227ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133442025-03-07T23:30:35.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3a203a2-c9ff-420e-9863-40536070a183 uri = /v1/ip-pools/default?project=demo-project
133452025-03-07T23:30:35.230ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3a203a2-c9ff-420e-9863-40536070a183 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133462025-03-07T23:30:35.230ZINFOtest_unauthorized (external client test context): client received response status = 405
133472025-03-07T23:30:35.230ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/ip-pools/default?project=demo-project
133482025-03-07T23:30:35.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133492025-03-07T23:30:35.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8747bf2e-75d9-42ef-ad78-85b56958d041 uri = /v1/ip-pools/default?project=demo-project
133502025-03-07T23:30:35.231ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8747bf2e-75d9-42ef-ad78-85b56958d041 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133512025-03-07T23:30:35.231ZINFOtest_unauthorized (external client test context): client received response status = 405
133522025-03-07T23:30:35.231ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/ip-pools/default?project=demo-project
133532025-03-07T23:30:35.231ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133542025-03-07T23:30:35.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 73da077b-158a-4900-989c-c517fd32e799 uri = /v1/ip-pools/default?project=demo-project
133552025-03-07T23:30:35.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 174 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 73da077b-158a-4900-989c-c517fd32e799 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133562025-03-07T23:30:35.232ZINFOtest_unauthorized (external client test context): client received response status = 405
133572025-03-07T23:30:35.232ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/ip-pools/default?project=demo-project
133582025-03-07T23:30:35.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133592025-03-07T23:30:35.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fc1267d8-0ca5-4437-911c-f541bc93c30f uri = /v1/ip-pools/default?project=demo-project
133602025-03-07T23:30:35.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fc1267d8-0ca5-4437-911c-f541bc93c30f response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133612025-03-07T23:30:35.233ZINFOtest_unauthorized (external client test context): client received response status = 405
133622025-03-07T23:30:35.233ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/ip-pools/default?project=demo-project
133632025-03-07T23:30:35.233ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133642025-03-07T23:30:35.233ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1d0ffd4f-b045-4d81-ac30-6b2542dd6593 uri = /v1/ip-pools/default?project=demo-project
133652025-03-07T23:30:35.233ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1d0ffd4f-b045-4d81-ac30-6b2542dd6593 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133662025-03-07T23:30:35.234ZINFOtest_unauthorized (external client test context): client received response status = 405
133672025-03-07T23:30:35.234ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/ip-pools/default?project=demo-project
133682025-03-07T23:30:35.234ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133692025-03-07T23:30:35.234ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9a443610-ed52-46e1-a9b9-198a3ff72a44 uri = /v1/ip-pools/default?project=demo-project
133702025-03-07T23:30:35.234ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 88 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9a443610-ed52-46e1-a9b9-198a3ff72a44 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133712025-03-07T23:30:35.234ZINFOtest_unauthorized (external client test context): client received response status = 405
133722025-03-07T23:30:35.234ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/ip-pools/default?project=demo-project
133732025-03-07T23:30:35.234ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133742025-03-07T23:30:35.234ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e13493f4-b3f5-41fd-9080-edf745530963 uri = /v1/ip-pools/default?project=demo-project
133752025-03-07T23:30:35.235ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e13493f4-b3f5-41fd-9080-edf745530963 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133762025-03-07T23:30:35.235ZINFOtest_unauthorized (external client test context): client received response status = 405
133772025-03-07T23:30:35.235ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/ip-pools/default?project=demo-project
133782025-03-07T23:30:35.235ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133792025-03-07T23:30:35.235ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d7510bb8-752c-4389-9cc2-2967237e0a54 uri = /v1/ip-pools/default?project=demo-project
133802025-03-07T23:30:35.235ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 101 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d7510bb8-752c-4389-9cc2-2967237e0a54 response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133812025-03-07T23:30:35.235ZINFOtest_unauthorized (external client test context): client received response status = 405
133822025-03-07T23:30:35.235ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/ip-pools/default?project=demo-project
133832025-03-07T23:30:35.235ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133842025-03-07T23:30:35.236ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 81e2e307-976d-426c-802d-58af7a92bbce uri = /v1/ip-pools/default?project=demo-project
133852025-03-07T23:30:35.236ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 81e2e307-976d-426c-802d-58af7a92bbce response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133862025-03-07T23:30:35.236ZINFOtest_unauthorized (external client test context): client received response status = 405
133872025-03-07T23:30:35.236ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/ip-pools/default?project=demo-project
133882025-03-07T23:30:35.236ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133892025-03-07T23:30:35.236ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 81b254fa-5fc0-4175-9398-96447c76aeef uri = /v1/ip-pools/default?project=demo-project
133902025-03-07T23:30:35.237ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 183 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 81b254fa-5fc0-4175-9398-96447c76aeef response_code = 405 uri = /v1/ip-pools/default?project=demo-project
133912025-03-07T23:30:35.237ZINFOtest_unauthorized (external client test context): client received response status = 405
133922025-03-07T23:30:35.237ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/ip-pools/default?project=demo-project
133932025-03-07T23:30:35.237ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/ip-pools/default?project=demo-project
133942025-03-07T23:30:35.237ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b uri = /v1/ip-pools/default?project=demo-project
133952025-03-07T23:30:35.237ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b uri = /v1/ip-pools/default?project=demo-project
133962025-03-07T23:30:35.237ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/ip-pools/default?project=demo-project
133972025-03-07T23:30:35.237ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
133982025-03-07T23:30:35.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
133992025-03-07T23:30:35.238ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134002025-03-07T23:30:35.242ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134012025-03-07T23:30:35.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134022025-03-07T23:30:35.243ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134032025-03-07T23:30:35.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
134042025-03-07T23:30:35.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
134052025-03-07T23:30:35.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134062025-03-07T23:30:35.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134072025-03-07T23:30:35.253ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134082025-03-07T23:30:35.266ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
134092025-03-07T23:30:35.266ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
134102025-03-07T23:30:35.266ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134112025-03-07T23:30:35.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134122025-03-07T23:30:35.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134132025-03-07T23:30:35.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
134142025-03-07T23:30:35.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
134152025-03-07T23:30:35.275ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134162025-03-07T23:30:35.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134172025-03-07T23:30:35.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134182025-03-07T23:30:35.279ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
134192025-03-07T23:30:35.280ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
134202025-03-07T23:30:35.280ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134212025-03-07T23:30:35.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134222025-03-07T23:30:35.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134232025-03-07T23:30:35.282ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
134242025-03-07T23:30:35.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134252025-03-07T23:30:35.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134262025-03-07T23:30:35.283ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134272025-03-07T23:30:35.286ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
134282025-03-07T23:30:35.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
134292025-03-07T23:30:35.291ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b uri = /v1/ip-pools/default?project=demo-project
134302025-03-07T23:30:35.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = Database uri = /v1/ip-pools/default?project=demo-project
134312025-03-07T23:30:35.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
134322025-03-07T23:30:35.294ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
134332025-03-07T23:30:35.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/ip-pools/default?project=demo-project
134342025-03-07T23:30:35.298ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/ip-pools/default?project=demo-project
134352025-03-07T23:30:35.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = Database uri = /v1/ip-pools/default?project=demo-project
134362025-03-07T23:30:35.298ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
134372025-03-07T23:30:35.299ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
134382025-03-07T23:30:35.308ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/ip-pools/default?project=demo-project
134392025-03-07T23:30:35.313ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
134402025-03-07T23:30:35.313ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = Database uri = /v1/ip-pools/default?project=demo-project
134412025-03-07T23:30:35.313ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b roles = RoleSet { roles: {} } uri = /v1/ip-pools/default?project=demo-project
134422025-03-07T23:30:35.314ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b resource = Database result = Ok(()) uri = /v1/ip-pools/default?project=demo-project
134432025-03-07T23:30:35.317ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 80244 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e79f3303-4793-4d62-91ee-972c672baa8b response_code = 200 uri = /v1/ip-pools/default?project=demo-project
134442025-03-07T23:30:35.318ZINFOtest_unauthorized (external client test context): client received response status = 200
134452025-03-07T23:30:35.318ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/silos
134462025-03-07T23:30:35.318ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default/silos
134472025-03-07T23:30:35.318ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
134482025-03-07T23:30:35.318ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 uri = /v1/system/ip-pools/default/silos
134492025-03-07T23:30:35.318ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 uri = /v1/system/ip-pools/default/silos
134502025-03-07T23:30:35.318ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
134512025-03-07T23:30:35.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134522025-03-07T23:30:35.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134532025-03-07T23:30:35.319ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134542025-03-07T23:30:35.322ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134552025-03-07T23:30:35.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134562025-03-07T23:30:35.323ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134572025-03-07T23:30:35.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
134582025-03-07T23:30:35.325ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
134592025-03-07T23:30:35.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134602025-03-07T23:30:35.325ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134612025-03-07T23:30:35.326ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134622025-03-07T23:30:35.328ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
134632025-03-07T23:30:35.328ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134642025-03-07T23:30:35.328ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134652025-03-07T23:30:35.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134662025-03-07T23:30:35.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
134672025-03-07T23:30:35.335ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
134682025-03-07T23:30:35.335ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134692025-03-07T23:30:35.335ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134702025-03-07T23:30:35.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134712025-03-07T23:30:35.338ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
134722025-03-07T23:30:35.338ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
134732025-03-07T23:30:35.338ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134742025-03-07T23:30:35.339ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134752025-03-07T23:30:35.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134762025-03-07T23:30:35.343ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
134772025-03-07T23:30:35.343ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
134782025-03-07T23:30:35.343ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
134792025-03-07T23:30:35.344ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
134802025-03-07T23:30:35.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
134812025-03-07T23:30:35.351ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
134822025-03-07T23:30:35.351ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 uri = /v1/system/ip-pools/default/silos
134832025-03-07T23:30:35.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database uri = /v1/system/ip-pools/default/silos
134842025-03-07T23:30:35.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134852025-03-07T23:30:35.352ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
134862025-03-07T23:30:35.355ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
134872025-03-07T23:30:35.355ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
134882025-03-07T23:30:35.355ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database uri = /v1/system/ip-pools/default/silos
134892025-03-07T23:30:35.355ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134902025-03-07T23:30:35.356ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
134912025-03-07T23:30:35.361ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
134922025-03-07T23:30:35.369ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
134932025-03-07T23:30:35.369ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Fleet uri = /v1/system/ip-pools/default/silos
134942025-03-07T23:30:35.369ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
134952025-03-07T23:30:35.369ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database uri = /v1/system/ip-pools/default/silos
134962025-03-07T23:30:35.369ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
134972025-03-07T23:30:35.370ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
134982025-03-07T23:30:35.375ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
134992025-03-07T23:30:35.381ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Fleet result = Ok(()) uri = /v1/system/ip-pools/default/silos
135002025-03-07T23:30:35.381ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database uri = /v1/system/ip-pools/default/silos
135012025-03-07T23:30:35.382ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135022025-03-07T23:30:35.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
135032025-03-07T23:30:35.390ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 71765 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53db6c18-f742-4f17-9187-b12b6d2def22 response_code = 200 uri = /v1/system/ip-pools/default/silos
135042025-03-07T23:30:35.391ZINFOtest_unauthorized (external client test context): client received response status = 200
135052025-03-07T23:30:35.391ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/silos
135062025-03-07T23:30:35.391ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
135072025-03-07T23:30:35.392ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 uri = /v1/system/ip-pools/default/silos
135082025-03-07T23:30:35.392ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 uri = /v1/system/ip-pools/default/silos
135092025-03-07T23:30:35.392ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos
135102025-03-07T23:30:35.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135112025-03-07T23:30:35.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135122025-03-07T23:30:35.393ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135132025-03-07T23:30:35.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135142025-03-07T23:30:35.397ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135152025-03-07T23:30:35.397ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135162025-03-07T23:30:35.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
135172025-03-07T23:30:35.400ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
135182025-03-07T23:30:35.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135192025-03-07T23:30:35.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135202025-03-07T23:30:35.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135212025-03-07T23:30:35.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
135222025-03-07T23:30:35.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
135232025-03-07T23:30:35.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
135242025-03-07T23:30:35.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135252025-03-07T23:30:35.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135262025-03-07T23:30:35.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135272025-03-07T23:30:35.417ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = eec8aa07-dba8-46aa-bda3-7fd79cc28a60 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
135282025-03-07T23:30:35.418ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = eec8aa07-dba8-46aa-bda3-7fd79cc28a60 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
135292025-03-07T23:30:35.418ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = eec8aa07-dba8-46aa-bda3-7fd79cc28a60 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
135302025-03-07T23:30:35.418ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = eec8aa07-dba8-46aa-bda3-7fd79cc28a60 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
135312025-03-07T23:30:35.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
135322025-03-07T23:30:35.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
135332025-03-07T23:30:35.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135342025-03-07T23:30:35.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135352025-03-07T23:30:35.425ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135362025-03-07T23:30:35.426ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8700 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = eec8aa07-dba8-46aa-bda3-7fd79cc28a60 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
135372025-03-07T23:30:35.426ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "eec8aa07-dba8-46aa-bda3-7fd79cc28a60", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:34 GMT"} })
135382025-03-07T23:30:35.426ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
135392025-03-07T23:30:35.427ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 3770474d-f0d0-4736-8fcd-74d2fc4d2f1d uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
135402025-03-07T23:30:35.428ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 3770474d-f0d0-4736-8fcd-74d2fc4d2f1d resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
135412025-03-07T23:30:35.428ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 3770474d-f0d0-4736-8fcd-74d2fc4d2f1d roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
135422025-03-07T23:30:35.430ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 3770474d-f0d0-4736-8fcd-74d2fc4d2f1d resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
135432025-03-07T23:30:35.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
135442025-03-07T23:30:35.430ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
135452025-03-07T23:30:35.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135462025-03-07T23:30:35.431ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135472025-03-07T23:30:35.432ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135482025-03-07T23:30:35.435ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7886 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 3770474d-f0d0-4736-8fcd-74d2fc4d2f1d response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
135492025-03-07T23:30:35.435ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
135502025-03-07T23:30:35.435ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
135512025-03-07T23:30:35.435ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
135522025-03-07T23:30:35.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
135532025-03-07T23:30:35.436ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "3770474d-f0d0-4736-8fcd-74d2fc4d2f1d", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:34 GMT"} })
135542025-03-07T23:30:35.437ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135552025-03-07T23:30:35.437ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135562025-03-07T23:30:35.437ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
135572025-03-07T23:30:35.438ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
135582025-03-07T23:30:35.450ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
135592025-03-07T23:30:35.450ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 uri = /v1/system/ip-pools/default/silos
135602025-03-07T23:30:35.450ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource = Database uri = /v1/system/ip-pools/default/silos
135612025-03-07T23:30:35.450ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135622025-03-07T23:30:35.454ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
135632025-03-07T23:30:35.454ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135642025-03-07T23:30:35.455ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135652025-03-07T23:30:35.455ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 982745d4-f7c2-4cf0-8392-80158937bc45 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135662025-03-07T23:30:35.563ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 107750 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 982745d4-f7c2-4cf0-8392-80158937bc45 response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135672025-03-07T23:30:35.576ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135682025-03-07T23:30:35.576ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135692025-03-07T23:30:35.576ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135702025-03-07T23:30:35.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
135712025-03-07T23:30:35.577ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
135722025-03-07T23:30:35.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource = Database uri = /v1/system/ip-pools/default/silos
135732025-03-07T23:30:35.577ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135742025-03-07T23:30:35.578ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
135752025-03-07T23:30:35.582ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135762025-03-07T23:30:35.583ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135772025-03-07T23:30:35.583ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135782025-03-07T23:30:35.583ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
135792025-03-07T23:30:35.583ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135802025-03-07T23:30:35.600ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos
135812025-03-07T23:30:35.600ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 208290 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbd8d9f3-e253-4236-9be1-7972c9651eb0 response_code = 404 uri = /v1/system/ip-pools/default/silos
135822025-03-07T23:30:35.602ZINFOtest_unauthorized (external client test context): client received response status = 404
135832025-03-07T23:30:35.602ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/silos
135842025-03-07T23:30:35.602ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
135852025-03-07T23:30:35.717ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135862025-03-07T23:30:35.724ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135872025-03-07T23:30:35.724ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
135882025-03-07T23:30:35.725ZDEBGtest_unauthorized (results-sink): inserting 57 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
135892025-03-07T23:30:35.725ZDEBGtest_unauthorized (results-sink-cluster): inserting 57 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
135902025-03-07T23:30:35.726ZDEBGtest_unauthorized (clickhouse-client): unrolling 57 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
135912025-03-07T23:30:35.807ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
135922025-03-07T23:30:35.808ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c uri = /v1/system/ip-pools/default/silos
135932025-03-07T23:30:35.808ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c uri = /v1/system/ip-pools/default/silos
135942025-03-07T23:30:35.808ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c uri = /v1/system/ip-pools/default/silos
135952025-03-07T23:30:35.808ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c uri = /v1/system/ip-pools/default/silos
135962025-03-07T23:30:35.808ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c resource = Database uri = /v1/system/ip-pools/default/silos
135972025-03-07T23:30:35.808ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
135982025-03-07T23:30:35.809ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos
135992025-03-07T23:30:35.809ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1169 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b0f104e-1711-4d74-8f55-ed2b4228601c response_code = 401 uri = /v1/system/ip-pools/default/silos
136002025-03-07T23:30:35.810ZINFOtest_unauthorized (external client test context): client received response status = 401
136012025-03-07T23:30:35.810ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/silos
136022025-03-07T23:30:35.810ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136032025-03-07T23:30:35.812ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1c4c0e7-b0bb-4e42-8c9e-21a23de82eba uri = /v1/system/ip-pools/default/silos
136042025-03-07T23:30:35.812ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1c4c0e7-b0bb-4e42-8c9e-21a23de82eba uri = /v1/system/ip-pools/default/silos
136052025-03-07T23:30:35.812ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1c4c0e7-b0bb-4e42-8c9e-21a23de82eba uri = /v1/system/ip-pools/default/silos
136062025-03-07T23:30:35.812ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 248 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1c4c0e7-b0bb-4e42-8c9e-21a23de82eba response_code = 401 uri = /v1/system/ip-pools/default/silos
136072025-03-07T23:30:35.813ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = fields_ipaddr
136082025-03-07T23:30:35.814ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 108 sql = INSERT INTO oximeter.fields_string FORMAT Native
136092025-03-07T23:30:35.818ZINFOtest_unauthorized (external client test context): client received response status = 401
136102025-03-07T23:30:35.818ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/silos
136112025-03-07T23:30:35.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136122025-03-07T23:30:35.820ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2f947763-ee56-4d21-b508-7d43aa292130 uri = /v1/system/ip-pools/default/silos
136132025-03-07T23:30:35.824ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2f947763-ee56-4d21-b508-7d43aa292130 uri = /v1/system/ip-pools/default/silos
136142025-03-07T23:30:35.825ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1236:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolSiloLink>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1262:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolSiloLink>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolSiloLink>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2f947763-ee56-4d21-b508-7d43aa292130 uri = /v1/system/ip-pools/default/silos
136152025-03-07T23:30:35.825ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5544 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2f947763-ee56-4d21-b508-7d43aa292130 response_code = 401 uri = /v1/system/ip-pools/default/silos
136162025-03-07T23:30:35.827ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 108 table_name = fields_string
136172025-03-07T23:30:35.827ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 53 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
136182025-03-07T23:30:35.827ZINFOtest_unauthorized (external client test context): client received response status = 401
136192025-03-07T23:30:35.827ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/silos
136202025-03-07T23:30:35.827ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136212025-03-07T23:30:35.829ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
136222025-03-07T23:30:35.830ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c9dcbeda-c244-4f86-a8c5-59044cc5a064 uri = /v1/system/ip-pools/default/silos
136232025-03-07T23:30:35.830ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 91 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c9dcbeda-c244-4f86-a8c5-59044cc5a064 response_code = 405 uri = /v1/system/ip-pools/default/silos
136242025-03-07T23:30:35.836ZINFOtest_unauthorized (external client test context): client received response status = 405
136252025-03-07T23:30:35.836ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/silos
136262025-03-07T23:30:35.836ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136272025-03-07T23:30:35.836ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 53 table_name = fields_u16
136282025-03-07T23:30:35.836ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 62 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
136292025-03-07T23:30:35.837ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f3773936-dc8e-47aa-bae1-df8b2875dbc4 uri = /v1/system/ip-pools/default/silos
136302025-03-07T23:30:35.837ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 135 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f3773936-dc8e-47aa-bae1-df8b2875dbc4 response_code = 405 uri = /v1/system/ip-pools/default/silos
136312025-03-07T23:30:35.842ZINFOtest_unauthorized (external client test context): client received response status = 405
136322025-03-07T23:30:35.843ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/silos
136332025-03-07T23:30:35.843ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136342025-03-07T23:30:35.846ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 62 table_name = fields_uuid
136352025-03-07T23:30:35.846ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
136362025-03-07T23:30:35.846ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 01b4e603-011f-445d-97bc-47229c479d29 uri = /v1/system/ip-pools/default/silos
136372025-03-07T23:30:35.846ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 91 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 01b4e603-011f-445d-97bc-47229c479d29 response_code = 405 uri = /v1/system/ip-pools/default/silos
136382025-03-07T23:30:35.867ZINFOtest_unauthorized (external client test context): client received response status = 405
136392025-03-07T23:30:35.867ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/silos
136402025-03-07T23:30:35.867ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136412025-03-07T23:30:35.868ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c93b8405-6f70-47c1-be1d-fd3d8b5be9f4 uri = /v1/system/ip-pools/default/silos
136422025-03-07T23:30:35.868ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 113 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c93b8405-6f70-47c1-be1d-fd3d8b5be9f4 response_code = 405 uri = /v1/system/ip-pools/default/silos
136432025-03-07T23:30:35.873ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_cumulativeu64
136442025-03-07T23:30:35.873ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 52 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
136452025-03-07T23:30:35.873ZINFOtest_unauthorized (external client test context): client received response status = 405
136462025-03-07T23:30:35.874ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/silos
136472025-03-07T23:30:35.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
136482025-03-07T23:30:35.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 uri = /v1/system/ip-pools/default/silos
136492025-03-07T23:30:35.883ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 uri = /v1/system/ip-pools/default/silos
136502025-03-07T23:30:35.883ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos
136512025-03-07T23:30:35.883ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136522025-03-07T23:30:35.883ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136532025-03-07T23:30:35.884ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136542025-03-07T23:30:35.889ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136552025-03-07T23:30:35.889ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136562025-03-07T23:30:35.890ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136572025-03-07T23:30:35.891ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 52 table_name = measurements_histogramu64
136582025-03-07T23:30:35.891ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 4 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
136592025-03-07T23:30:35.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
136602025-03-07T23:30:35.895ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
136612025-03-07T23:30:35.895ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136622025-03-07T23:30:35.895ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136632025-03-07T23:30:35.896ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136642025-03-07T23:30:35.896ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 4 table_name = measurements_i64
136652025-03-07T23:30:35.896ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
136662025-03-07T23:30:35.910ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
136672025-03-07T23:30:35.910ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136682025-03-07T23:30:35.910ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136692025-03-07T23:30:35.911ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136702025-03-07T23:30:35.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
136712025-03-07T23:30:35.923ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
136722025-03-07T23:30:35.923ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136732025-03-07T23:30:35.923ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136742025-03-07T23:30:35.924ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136752025-03-07T23:30:35.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
136762025-03-07T23:30:35.926ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
136772025-03-07T23:30:35.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136782025-03-07T23:30:35.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136792025-03-07T23:30:35.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136802025-03-07T23:30:35.946ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
136812025-03-07T23:30:35.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
136822025-03-07T23:30:35.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
136832025-03-07T23:30:35.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
136842025-03-07T23:30:35.952ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
136852025-03-07T23:30:35.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
136862025-03-07T23:30:35.957ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 uri = /v1/system/ip-pools/default/silos
136872025-03-07T23:30:35.957ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource = Database uri = /v1/system/ip-pools/default/silos
136882025-03-07T23:30:35.957ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136892025-03-07T23:30:35.958ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
136902025-03-07T23:30:35.960ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
136912025-03-07T23:30:35.960ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
136922025-03-07T23:30:35.960ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource = Database uri = /v1/system/ip-pools/default/silos
136932025-03-07T23:30:35.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136942025-03-07T23:30:35.961ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
136952025-03-07T23:30:35.973ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
136962025-03-07T23:30:35.989ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos
136972025-03-07T23:30:35.989ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 115000 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b10780b3-4524-4e83-88fc-4c1bf551da90 response_code = 404 uri = /v1/system/ip-pools/default/silos
136982025-03-07T23:30:35.990ZINFOtest_unauthorized (external client test context): client received response status = 404
136992025-03-07T23:30:35.991ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/silos
137002025-03-07T23:30:35.991ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137012025-03-07T23:30:35.995ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b uri = /v1/system/ip-pools/default/silos
137022025-03-07T23:30:35.996ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b uri = /v1/system/ip-pools/default/silos
137032025-03-07T23:30:35.997ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b uri = /v1/system/ip-pools/default/silos
137042025-03-07T23:30:35.997ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b uri = /v1/system/ip-pools/default/silos
137052025-03-07T23:30:35.997ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b resource = Database uri = /v1/system/ip-pools/default/silos
137062025-03-07T23:30:35.997ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
137072025-03-07T23:30:35.998ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos
137082025-03-07T23:30:35.998ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 2546 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132d98a7-c574-4130-be08-81a96365397b response_code = 401 uri = /v1/system/ip-pools/default/silos
137092025-03-07T23:30:35.998ZINFOtest_unauthorized (external client test context): client received response status = 401
137102025-03-07T23:30:35.998ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/silos
137112025-03-07T23:30:35.998ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137122025-03-07T23:30:36.002ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cd43f4bc-f932-48ef-a6fd-8ceaccf17d63 uri = /v1/system/ip-pools/default/silos
137132025-03-07T23:30:36.003ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cd43f4bc-f932-48ef-a6fd-8ceaccf17d63 uri = /v1/system/ip-pools/default/silos
137142025-03-07T23:30:36.003ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cd43f4bc-f932-48ef-a6fd-8ceaccf17d63 uri = /v1/system/ip-pools/default/silos
137152025-03-07T23:30:36.003ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 508 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cd43f4bc-f932-48ef-a6fd-8ceaccf17d63 response_code = 401 uri = /v1/system/ip-pools/default/silos
137162025-03-07T23:30:36.003ZINFOtest_unauthorized (external client test context): client received response status = 401
137172025-03-07T23:30:36.003ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/silos
137182025-03-07T23:30:36.003ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137192025-03-07T23:30:36.003ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30dc10c9-f145-4e33-be72-237de94f5bf1 uri = /v1/system/ip-pools/default/silos
137202025-03-07T23:30:36.004ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30dc10c9-f145-4e33-be72-237de94f5bf1 uri = /v1/system/ip-pools/default/silos
137212025-03-07T23:30:36.005ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1273:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolSiloLink>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1287:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolSiloLink>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_link::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolLinkSilo>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolSiloLink>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30dc10c9-f145-4e33-be72-237de94f5bf1 uri = /v1/system/ip-pools/default/silos
137222025-03-07T23:30:36.005ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1334 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30dc10c9-f145-4e33-be72-237de94f5bf1 response_code = 401 uri = /v1/system/ip-pools/default/silos
137232025-03-07T23:30:36.005ZINFOtest_unauthorized (external client test context): client received response status = 401
137242025-03-07T23:30:36.005ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/silos
137252025-03-07T23:30:36.005ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137262025-03-07T23:30:36.005ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ffcb9823-1faf-4ff9-bc59-e539bf2b32e8 uri = /v1/system/ip-pools/default/silos
137272025-03-07T23:30:36.005ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ffcb9823-1faf-4ff9-bc59-e539bf2b32e8 response_code = 405 uri = /v1/system/ip-pools/default/silos
137282025-03-07T23:30:36.006ZINFOtest_unauthorized (external client test context): client received response status = 405
137292025-03-07T23:30:36.006ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/silos
137302025-03-07T23:30:36.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137312025-03-07T23:30:36.006ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4e309c77-9a08-418d-a129-b52e2c2e72e2 uri = /v1/system/ip-pools/default/silos
137322025-03-07T23:30:36.006ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 105 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4e309c77-9a08-418d-a129-b52e2c2e72e2 response_code = 405 uri = /v1/system/ip-pools/default/silos
137332025-03-07T23:30:36.006ZINFOtest_unauthorized (external client test context): client received response status = 405
137342025-03-07T23:30:36.006ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/silos
137352025-03-07T23:30:36.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137362025-03-07T23:30:36.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 477c5578-5afd-43ae-807e-b8e9ebcd6930 uri = /v1/system/ip-pools/default/silos
137372025-03-07T23:30:36.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 477c5578-5afd-43ae-807e-b8e9ebcd6930 response_code = 405 uri = /v1/system/ip-pools/default/silos
137382025-03-07T23:30:36.007ZINFOtest_unauthorized (external client test context): client received response status = 405
137392025-03-07T23:30:36.007ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/silos
137402025-03-07T23:30:36.007ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137412025-03-07T23:30:36.011ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 13c5a6a9-6d05-4dbd-bd8a-660d348aa8bc uri = /v1/system/ip-pools/default/silos
137422025-03-07T23:30:36.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 4719 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 13c5a6a9-6d05-4dbd-bd8a-660d348aa8bc response_code = 405 uri = /v1/system/ip-pools/default/silos
137432025-03-07T23:30:36.016ZINFOtest_unauthorized (external client test context): client received response status = 405
137442025-03-07T23:30:36.016ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/silos
137452025-03-07T23:30:36.016ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137462025-03-07T23:30:36.016ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3e7cb9d-2f4e-4510-8c95-eb1aba445b07 uri = /v1/system/ip-pools/default/silos
137472025-03-07T23:30:36.016ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3e7cb9d-2f4e-4510-8c95-eb1aba445b07 response_code = 405 uri = /v1/system/ip-pools/default/silos
137482025-03-07T23:30:36.016ZINFOtest_unauthorized (external client test context): client received response status = 405
137492025-03-07T23:30:36.017ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/silos
137502025-03-07T23:30:36.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137512025-03-07T23:30:36.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = eff1354c-d286-4188-bc90-7f2f99fe3e6f uri = /v1/system/ip-pools/default/silos
137522025-03-07T23:30:36.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1055 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = eff1354c-d286-4188-bc90-7f2f99fe3e6f response_code = 405 uri = /v1/system/ip-pools/default/silos
137532025-03-07T23:30:36.018ZINFOtest_unauthorized (external client test context): client received response status = 405
137542025-03-07T23:30:36.018ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/silos
137552025-03-07T23:30:36.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137562025-03-07T23:30:36.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7e739d22-4f3c-46bb-aef4-f44e5ec64293 uri = /v1/system/ip-pools/default/silos
137572025-03-07T23:30:36.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7e739d22-4f3c-46bb-aef4-f44e5ec64293 response_code = 405 uri = /v1/system/ip-pools/default/silos
137582025-03-07T23:30:36.019ZINFOtest_unauthorized (external client test context): client received response status = 405
137592025-03-07T23:30:36.019ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/silos
137602025-03-07T23:30:36.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137612025-03-07T23:30:36.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 17b321cb-1125-463f-b98a-ed0a52a1b3d0 uri = /v1/system/ip-pools/default/silos
137622025-03-07T23:30:36.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 167 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 17b321cb-1125-463f-b98a-ed0a52a1b3d0 response_code = 405 uri = /v1/system/ip-pools/default/silos
137632025-03-07T23:30:36.020ZINFOtest_unauthorized (external client test context): client received response status = 405
137642025-03-07T23:30:36.020ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/silos
137652025-03-07T23:30:36.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos
137662025-03-07T23:30:36.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d uri = /v1/system/ip-pools/default/silos
137672025-03-07T23:30:36.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d uri = /v1/system/ip-pools/default/silos
137682025-03-07T23:30:36.020ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
137692025-03-07T23:30:36.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137702025-03-07T23:30:36.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137712025-03-07T23:30:36.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137722025-03-07T23:30:36.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137732025-03-07T23:30:36.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137742025-03-07T23:30:36.025ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137752025-03-07T23:30:36.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
137762025-03-07T23:30:36.028ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
137772025-03-07T23:30:36.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137782025-03-07T23:30:36.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137792025-03-07T23:30:36.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137802025-03-07T23:30:36.031ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
137812025-03-07T23:30:36.031ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137822025-03-07T23:30:36.031ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137832025-03-07T23:30:36.032ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137842025-03-07T23:30:36.036ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
137852025-03-07T23:30:36.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
137862025-03-07T23:30:36.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137872025-03-07T23:30:36.045ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137882025-03-07T23:30:36.046ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137892025-03-07T23:30:36.052ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
137902025-03-07T23:30:36.055ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
137912025-03-07T23:30:36.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137922025-03-07T23:30:36.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137932025-03-07T23:30:36.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137942025-03-07T23:30:36.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
137952025-03-07T23:30:36.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
137962025-03-07T23:30:36.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
137972025-03-07T23:30:36.080ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
137982025-03-07T23:30:36.083ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
137992025-03-07T23:30:36.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
138002025-03-07T23:30:36.087ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d uri = /v1/system/ip-pools/default/silos
138012025-03-07T23:30:36.087ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database uri = /v1/system/ip-pools/default/silos
138022025-03-07T23:30:36.087ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
138032025-03-07T23:30:36.088ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
138042025-03-07T23:30:36.096ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
138052025-03-07T23:30:36.097ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
138062025-03-07T23:30:36.097ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database uri = /v1/system/ip-pools/default/silos
138072025-03-07T23:30:36.097ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
138082025-03-07T23:30:36.099ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
138092025-03-07T23:30:36.102ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
138102025-03-07T23:30:36.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
138112025-03-07T23:30:36.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Fleet uri = /v1/system/ip-pools/default/silos
138122025-03-07T23:30:36.112ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
138132025-03-07T23:30:36.112ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database uri = /v1/system/ip-pools/default/silos
138142025-03-07T23:30:36.112ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
138152025-03-07T23:30:36.114ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
138162025-03-07T23:30:36.119ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
138172025-03-07T23:30:36.127ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Fleet result = Ok(()) uri = /v1/system/ip-pools/default/silos
138182025-03-07T23:30:36.127ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database uri = /v1/system/ip-pools/default/silos
138192025-03-07T23:30:36.127ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
138202025-03-07T23:30:36.127ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
138212025-03-07T23:30:36.142ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 122653 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eaceeaee-b378-41c3-9ecf-cad839d36c1d response_code = 200 uri = /v1/system/ip-pools/default/silos
138222025-03-07T23:30:36.144ZINFOtest_unauthorized (external client test context): client received response status = 200
138232025-03-07T23:30:36.146ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/silos/demo-silo
138242025-03-07T23:30:36.146ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools/default/silos/demo-silo
138252025-03-07T23:30:36.147ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/silos/demo-silo
138262025-03-07T23:30:36.147ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
138272025-03-07T23:30:36.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9bc7880-1381-4dfb-ae3a-0793fa522f17 uri = /v1/system/ip-pools/default/silos/demo-silo
138282025-03-07T23:30:36.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 7421 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9bc7880-1381-4dfb-ae3a-0793fa522f17 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138292025-03-07T23:30:36.159ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
138302025-03-07T23:30:36.159ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
138312025-03-07T23:30:36.159ZINFOtest_unauthorized (external client test context): client received response status = 405
138322025-03-07T23:30:36.159ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/silos/demo-silo
138332025-03-07T23:30:36.159ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
138342025-03-07T23:30:36.159ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4dd3e6b1-c4da-48ed-af83-88e2a1c4f8d6 uri = /v1/system/ip-pools/default/silos/demo-silo
138352025-03-07T23:30:36.159ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 182 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4dd3e6b1-c4da-48ed-af83-88e2a1c4f8d6 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138362025-03-07T23:30:36.160ZINFOtest_unauthorized (external client test context): client received response status = 405
138372025-03-07T23:30:36.160ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/silos/demo-silo
138382025-03-07T23:30:36.160ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
138392025-03-07T23:30:36.160ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 78e4f94e-e3ef-4aef-abb8-a929164b4476 uri = /v1/system/ip-pools/default/silos/demo-silo
138402025-03-07T23:30:36.160ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 78e4f94e-e3ef-4aef-abb8-a929164b4476 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138412025-03-07T23:30:36.160ZINFOtest_unauthorized (external client test context): client received response status = 405
138422025-03-07T23:30:36.161ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/silos/demo-silo
138432025-03-07T23:30:36.161ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
138442025-03-07T23:30:36.161ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eca280e1-3de7-46a3-813c-6eee808788cd uri = /v1/system/ip-pools/default/silos/demo-silo
138452025-03-07T23:30:36.161ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eca280e1-3de7-46a3-813c-6eee808788cd response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
138462025-03-07T23:30:36.161ZINFOtest_unauthorized (external client test context): client received response status = 405
138472025-03-07T23:30:36.161ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
138482025-03-07T23:30:36.161ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
138492025-03-07T23:30:36.162ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e uri = /v1/system/ip-pools/default/silos/demo-silo
138502025-03-07T23:30:36.162ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e uri = /v1/system/ip-pools/default/silos/demo-silo
138512025-03-07T23:30:36.162ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos/demo-silo
138522025-03-07T23:30:36.162ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138532025-03-07T23:30:36.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138542025-03-07T23:30:36.163ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138552025-03-07T23:30:36.177ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138562025-03-07T23:30:36.177ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138572025-03-07T23:30:36.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138582025-03-07T23:30:36.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
138592025-03-07T23:30:36.180ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
138602025-03-07T23:30:36.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138612025-03-07T23:30:36.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138622025-03-07T23:30:36.182ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138632025-03-07T23:30:36.190ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
138642025-03-07T23:30:36.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138652025-03-07T23:30:36.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138662025-03-07T23:30:36.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138672025-03-07T23:30:36.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
138682025-03-07T23:30:36.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
138692025-03-07T23:30:36.197ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138702025-03-07T23:30:36.197ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138712025-03-07T23:30:36.198ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138722025-03-07T23:30:36.201ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
138732025-03-07T23:30:36.201ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
138742025-03-07T23:30:36.201ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138752025-03-07T23:30:36.201ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138762025-03-07T23:30:36.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138772025-03-07T23:30:36.206ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
138782025-03-07T23:30:36.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
138792025-03-07T23:30:36.206ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
138802025-03-07T23:30:36.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
138812025-03-07T23:30:36.209ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
138822025-03-07T23:30:36.213ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
138832025-03-07T23:30:36.214ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e uri = /v1/system/ip-pools/default/silos/demo-silo
138842025-03-07T23:30:36.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
138852025-03-07T23:30:36.214ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
138862025-03-07T23:30:36.214ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
138872025-03-07T23:30:36.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos/demo-silo
138882025-03-07T23:30:36.216ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos/demo-silo
138892025-03-07T23:30:36.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
138902025-03-07T23:30:36.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
138912025-03-07T23:30:36.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
138922025-03-07T23:30:36.235ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
138932025-03-07T23:30:36.287ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos/demo-silo
138942025-03-07T23:30:36.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 126281 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7a5a68dc-751e-4f7d-b45e-45eafc66191e response_code = 404 uri = /v1/system/ip-pools/default/silos/demo-silo
138952025-03-07T23:30:36.288ZINFOtest_unauthorized (external client test context): client received response status = 404
138962025-03-07T23:30:36.289ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
138972025-03-07T23:30:36.289ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
138982025-03-07T23:30:36.289ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 uri = /v1/system/ip-pools/default/silos/demo-silo
138992025-03-07T23:30:36.290ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 uri = /v1/system/ip-pools/default/silos/demo-silo
139002025-03-07T23:30:36.290ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 uri = /v1/system/ip-pools/default/silos/demo-silo
139012025-03-07T23:30:36.290ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 uri = /v1/system/ip-pools/default/silos/demo-silo
139022025-03-07T23:30:36.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
139032025-03-07T23:30:36.290ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
139042025-03-07T23:30:36.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos/demo-silo
139052025-03-07T23:30:36.291ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1575 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b48b16ff-4504-45c1-998b-dbb260c9ecb7 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
139062025-03-07T23:30:36.291ZINFOtest_unauthorized (external client test context): client received response status = 401
139072025-03-07T23:30:36.291ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
139082025-03-07T23:30:36.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139092025-03-07T23:30:36.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 090b63a7-a30e-486d-95e3-085539a20b3c uri = /v1/system/ip-pools/default/silos/demo-silo
139102025-03-07T23:30:36.295ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 090b63a7-a30e-486d-95e3-085539a20b3c uri = /v1/system/ip-pools/default/silos/demo-silo
139112025-03-07T23:30:36.295ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 090b63a7-a30e-486d-95e3-085539a20b3c uri = /v1/system/ip-pools/default/silos/demo-silo
139122025-03-07T23:30:36.296ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 3894 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 090b63a7-a30e-486d-95e3-085539a20b3c response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
139132025-03-07T23:30:36.296ZINFOtest_unauthorized (external client test context): client received response status = 401
139142025-03-07T23:30:36.297ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/silos/demo-silo
139152025-03-07T23:30:36.298ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139162025-03-07T23:30:36.298ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 805004c3-89ec-4f06-bc61-8a6e1c81fb49 uri = /v1/system/ip-pools/default/silos/demo-silo
139172025-03-07T23:30:36.299ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 805004c3-89ec-4f06-bc61-8a6e1c81fb49 uri = /v1/system/ip-pools/default/silos/demo-silo
139182025-03-07T23:30:36.300ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1322:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolSiloLink>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1342:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolSiloLink>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::IpPoolSiloUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolSiloLink>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 805004c3-89ec-4f06-bc61-8a6e1c81fb49 uri = /v1/system/ip-pools/default/silos/demo-silo
139192025-03-07T23:30:36.301ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2130 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 805004c3-89ec-4f06-bc61-8a6e1c81fb49 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
139202025-03-07T23:30:36.301ZINFOtest_unauthorized (external client test context): client received response status = 401
139212025-03-07T23:30:36.301ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/silos/demo-silo
139222025-03-07T23:30:36.301ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139232025-03-07T23:30:36.302ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40ad1cda-900b-4c5b-88aa-7338e5e034b0 uri = /v1/system/ip-pools/default/silos/demo-silo
139242025-03-07T23:30:36.302ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 172 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40ad1cda-900b-4c5b-88aa-7338e5e034b0 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
139252025-03-07T23:30:36.302ZINFOtest_unauthorized (external client test context): client received response status = 405
139262025-03-07T23:30:36.302ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/silos/demo-silo
139272025-03-07T23:30:36.303ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139282025-03-07T23:30:36.303ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fbc008d8-64b5-40f2-ac0c-ddcae8cbf742 uri = /v1/system/ip-pools/default/silos/demo-silo
139292025-03-07T23:30:36.303ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 231 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fbc008d8-64b5-40f2-ac0c-ddcae8cbf742 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
139302025-03-07T23:30:36.303ZINFOtest_unauthorized (external client test context): client received response status = 405
139312025-03-07T23:30:36.304ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/silos/demo-silo
139322025-03-07T23:30:36.304ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139332025-03-07T23:30:36.304ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7296d911-255a-4bee-8a82-a589465daf1e uri = /v1/system/ip-pools/default/silos/demo-silo
139342025-03-07T23:30:36.304ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7296d911-255a-4bee-8a82-a589465daf1e response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
139352025-03-07T23:30:36.304ZINFOtest_unauthorized (external client test context): client received response status = 405
139362025-03-07T23:30:36.304ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/silos/demo-silo
139372025-03-07T23:30:36.304ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139382025-03-07T23:30:36.305ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c18df98f-fca9-4be6-91cf-b6b36a66bb51 uri = /v1/system/ip-pools/default/silos/demo-silo
139392025-03-07T23:30:36.305ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c18df98f-fca9-4be6-91cf-b6b36a66bb51 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
139402025-03-07T23:30:36.305ZINFOtest_unauthorized (external client test context): client received response status = 405
139412025-03-07T23:30:36.305ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
139422025-03-07T23:30:36.305ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139432025-03-07T23:30:36.305ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd uri = /v1/system/ip-pools/default/silos/demo-silo
139442025-03-07T23:30:36.306ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd uri = /v1/system/ip-pools/default/silos/demo-silo
139452025-03-07T23:30:36.306ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/silos/demo-silo
139462025-03-07T23:30:36.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139472025-03-07T23:30:36.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139482025-03-07T23:30:36.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139492025-03-07T23:30:36.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139502025-03-07T23:30:36.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139512025-03-07T23:30:36.354ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139522025-03-07T23:30:36.361ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
139532025-03-07T23:30:36.362ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
139542025-03-07T23:30:36.362ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139552025-03-07T23:30:36.362ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139562025-03-07T23:30:36.362ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139572025-03-07T23:30:36.364ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
139582025-03-07T23:30:36.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139592025-03-07T23:30:36.364ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139602025-03-07T23:30:36.365ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139612025-03-07T23:30:36.381ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
139622025-03-07T23:30:36.388ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
139632025-03-07T23:30:36.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139642025-03-07T23:30:36.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139652025-03-07T23:30:36.389ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139662025-03-07T23:30:36.423ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
139672025-03-07T23:30:36.423ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
139682025-03-07T23:30:36.423ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139692025-03-07T23:30:36.423ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139702025-03-07T23:30:36.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139712025-03-07T23:30:36.457ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
139722025-03-07T23:30:36.457ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
139732025-03-07T23:30:36.457ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
139742025-03-07T23:30:36.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
139752025-03-07T23:30:36.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
139762025-03-07T23:30:36.469ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
139772025-03-07T23:30:36.470ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd uri = /v1/system/ip-pools/default/silos/demo-silo
139782025-03-07T23:30:36.470ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
139792025-03-07T23:30:36.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
139802025-03-07T23:30:36.470ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
139812025-03-07T23:30:36.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos/demo-silo
139822025-03-07T23:30:36.472ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos/demo-silo
139832025-03-07T23:30:36.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
139842025-03-07T23:30:36.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
139852025-03-07T23:30:36.473ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos/demo-silo
139862025-03-07T23:30:36.495ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
139872025-03-07T23:30:36.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/silos/demo-silo
139882025-03-07T23:30:36.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 203341 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = be2f7c3f-a290-41dd-8933-b0d5793301fd response_code = 404 uri = /v1/system/ip-pools/default/silos/demo-silo
139892025-03-07T23:30:36.509ZINFOtest_unauthorized (external client test context): client received response status = 404
139902025-03-07T23:30:36.509ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
139912025-03-07T23:30:36.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
139922025-03-07T23:30:36.510ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 uri = /v1/system/ip-pools/default/silos/demo-silo
139932025-03-07T23:30:36.510ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 uri = /v1/system/ip-pools/default/silos/demo-silo
139942025-03-07T23:30:36.510ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 uri = /v1/system/ip-pools/default/silos/demo-silo
139952025-03-07T23:30:36.510ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 uri = /v1/system/ip-pools/default/silos/demo-silo
139962025-03-07T23:30:36.510ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 resource = Database uri = /v1/system/ip-pools/default/silos/demo-silo
139972025-03-07T23:30:36.510ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos/demo-silo
139982025-03-07T23:30:36.511ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/silos/demo-silo
139992025-03-07T23:30:36.511ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 905 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5680de20-b565-4d85-9b5b-6b8e1e262b60 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
140002025-03-07T23:30:36.511ZINFOtest_unauthorized (external client test context): client received response status = 401
140012025-03-07T23:30:36.511ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
140022025-03-07T23:30:36.511ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
140032025-03-07T23:30:36.511ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6c8beb06-e0ef-4768-af09-162a2f79be4b uri = /v1/system/ip-pools/default/silos/demo-silo
140042025-03-07T23:30:36.511ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6c8beb06-e0ef-4768-af09-162a2f79be4b uri = /v1/system/ip-pools/default/silos/demo-silo
140052025-03-07T23:30:36.511ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6c8beb06-e0ef-4768-af09-162a2f79be4b uri = /v1/system/ip-pools/default/silos/demo-silo
140062025-03-07T23:30:36.511ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 204 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6c8beb06-e0ef-4768-af09-162a2f79be4b response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
140072025-03-07T23:30:36.512ZINFOtest_unauthorized (external client test context): client received response status = 401
140082025-03-07T23:30:36.512ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/silos/demo-silo
140092025-03-07T23:30:36.512ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
140102025-03-07T23:30:36.512ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1b52a43e-fec0-4c9a-8721-eaa9cd21abb8 uri = /v1/system/ip-pools/default/silos/demo-silo
140112025-03-07T23:30:36.512ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1b52a43e-fec0-4c9a-8721-eaa9cd21abb8 uri = /v1/system/ip-pools/default/silos/demo-silo
140122025-03-07T23:30:36.513ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1297:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1311:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_silo_unlink::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolSiloPath>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1b52a43e-fec0-4c9a-8721-eaa9cd21abb8 uri = /v1/system/ip-pools/default/silos/demo-silo
140132025-03-07T23:30:36.513ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1107 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1b52a43e-fec0-4c9a-8721-eaa9cd21abb8 response_code = 401 uri = /v1/system/ip-pools/default/silos/demo-silo
140142025-03-07T23:30:36.513ZINFOtest_unauthorized (external client test context): client received response status = 401
140152025-03-07T23:30:36.513ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
140162025-03-07T23:30:36.513ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
140172025-03-07T23:30:36.513ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d801ffb-7dc0-42e4-a94c-88394ee1cf49 uri = /v1/system/ip-pools/default/silos/demo-silo
140182025-03-07T23:30:36.513ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d801ffb-7dc0-42e4-a94c-88394ee1cf49 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
140192025-03-07T23:30:36.551ZINFOtest_unauthorized (external client test context): client received response status = 405
140202025-03-07T23:30:36.552ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
140212025-03-07T23:30:36.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
140222025-03-07T23:30:36.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f33bf115-68be-4981-a2bc-50a13ab9de18 uri = /v1/system/ip-pools/default/silos/demo-silo
140232025-03-07T23:30:36.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f33bf115-68be-4981-a2bc-50a13ab9de18 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
140242025-03-07T23:30:36.552ZINFOtest_unauthorized (external client test context): client received response status = 405
140252025-03-07T23:30:36.552ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
140262025-03-07T23:30:36.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
140272025-03-07T23:30:36.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f314e6c2-38f1-4309-8144-c10391cc21d4 uri = /v1/system/ip-pools/default/silos/demo-silo
140282025-03-07T23:30:36.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f314e6c2-38f1-4309-8144-c10391cc21d4 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
140292025-03-07T23:30:36.553ZINFOtest_unauthorized (external client test context): client received response status = 405
140302025-03-07T23:30:36.553ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/silos/demo-silo
140312025-03-07T23:30:36.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/silos/demo-silo
140322025-03-07T23:30:36.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9ea08960-ed21-4eaf-8035-8605368db981 uri = /v1/system/ip-pools/default/silos/demo-silo
140332025-03-07T23:30:36.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9ea08960-ed21-4eaf-8035-8605368db981 response_code = 405 uri = /v1/system/ip-pools/default/silos/demo-silo
140342025-03-07T23:30:36.553ZINFOtest_unauthorized (external client test context): client received response status = 405
140352025-03-07T23:30:36.553ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/silos/demo-silo
140362025-03-07T23:30:36.554ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/ranges
140372025-03-07T23:30:36.554ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default/ranges
140382025-03-07T23:30:36.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
140392025-03-07T23:30:36.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 uri = /v1/system/ip-pools/default/ranges
140402025-03-07T23:30:36.554ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 uri = /v1/system/ip-pools/default/ranges
140412025-03-07T23:30:36.554ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges
140422025-03-07T23:30:36.554ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140432025-03-07T23:30:36.554ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140442025-03-07T23:30:36.555ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140452025-03-07T23:30:36.563ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
140462025-03-07T23:30:36.578ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
140472025-03-07T23:30:36.580ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140482025-03-07T23:30:36.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140492025-03-07T23:30:36.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140502025-03-07T23:30:36.583ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
140512025-03-07T23:30:36.584ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
140522025-03-07T23:30:36.584ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
140532025-03-07T23:30:36.584ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
140542025-03-07T23:30:36.586ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
140552025-03-07T23:30:36.587ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
140562025-03-07T23:30:36.587ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140572025-03-07T23:30:36.587ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140582025-03-07T23:30:36.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140592025-03-07T23:30:36.590ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
140602025-03-07T23:30:36.590ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140612025-03-07T23:30:36.590ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140622025-03-07T23:30:36.592ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140632025-03-07T23:30:36.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
140642025-03-07T23:30:36.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
140652025-03-07T23:30:36.612ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140662025-03-07T23:30:36.612ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140672025-03-07T23:30:36.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140682025-03-07T23:30:36.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
140692025-03-07T23:30:36.616ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
140702025-03-07T23:30:36.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140712025-03-07T23:30:36.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140722025-03-07T23:30:36.617ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140732025-03-07T23:30:36.621ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
140742025-03-07T23:30:36.622ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
140752025-03-07T23:30:36.622ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
140762025-03-07T23:30:36.622ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
140772025-03-07T23:30:36.624ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
140782025-03-07T23:30:36.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
140792025-03-07T23:30:36.642ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 uri = /v1/system/ip-pools/default/ranges
140802025-03-07T23:30:36.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database uri = /v1/system/ip-pools/default/ranges
140812025-03-07T23:30:36.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
140822025-03-07T23:30:36.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
140832025-03-07T23:30:36.646ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
140842025-03-07T23:30:36.646ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
140852025-03-07T23:30:36.646ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database uri = /v1/system/ip-pools/default/ranges
140862025-03-07T23:30:36.646ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
140872025-03-07T23:30:36.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
140882025-03-07T23:30:36.652ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
140892025-03-07T23:30:36.663ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
140902025-03-07T23:30:36.663ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database uri = /v1/system/ip-pools/default/ranges
140912025-03-07T23:30:36.663ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
140922025-03-07T23:30:36.664ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
140932025-03-07T23:30:36.665ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
140942025-03-07T23:30:36.665ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
140952025-03-07T23:30:36.666ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
140962025-03-07T23:30:36.667ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
140972025-03-07T23:30:36.667ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
140982025-03-07T23:30:36.668ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
140992025-03-07T23:30:36.669ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
141002025-03-07T23:30:36.669ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database uri = /v1/system/ip-pools/default/ranges
141012025-03-07T23:30:36.669ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141022025-03-07T23:30:36.669ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141032025-03-07T23:30:36.678ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
141042025-03-07T23:30:36.684ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141052025-03-07T23:30:36.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database uri = /v1/system/ip-pools/default/ranges
141062025-03-07T23:30:36.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141072025-03-07T23:30:36.685ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141082025-03-07T23:30:36.697ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 143416 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44e32ef0-8af1-49ee-b350-77e2c663f268 response_code = 200 uri = /v1/system/ip-pools/default/ranges
141092025-03-07T23:30:36.698ZINFOtest_unauthorized (external client test context): client received response status = 200
141102025-03-07T23:30:36.698ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/ranges
141112025-03-07T23:30:36.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141122025-03-07T23:30:36.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 uri = /v1/system/ip-pools/default/ranges
141132025-03-07T23:30:36.699ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 uri = /v1/system/ip-pools/default/ranges
141142025-03-07T23:30:36.699ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/ranges
141152025-03-07T23:30:36.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141162025-03-07T23:30:36.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141172025-03-07T23:30:36.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141182025-03-07T23:30:36.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141192025-03-07T23:30:36.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141202025-03-07T23:30:36.738ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141212025-03-07T23:30:36.741ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
141222025-03-07T23:30:36.741ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
141232025-03-07T23:30:36.742ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141242025-03-07T23:30:36.742ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141252025-03-07T23:30:36.742ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141262025-03-07T23:30:36.750ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
141272025-03-07T23:30:36.750ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141282025-03-07T23:30:36.750ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141292025-03-07T23:30:36.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141302025-03-07T23:30:36.758ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
141312025-03-07T23:30:36.768ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
141322025-03-07T23:30:36.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141332025-03-07T23:30:36.768ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141342025-03-07T23:30:36.768ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141352025-03-07T23:30:36.777ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
141362025-03-07T23:30:36.777ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
141372025-03-07T23:30:36.777ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141382025-03-07T23:30:36.777ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141392025-03-07T23:30:36.778ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141402025-03-07T23:30:36.783ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
141412025-03-07T23:30:36.783ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
141422025-03-07T23:30:36.783ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
141432025-03-07T23:30:36.783ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
141442025-03-07T23:30:36.789ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
141452025-03-07T23:30:36.793ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
141462025-03-07T23:30:36.794ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 uri = /v1/system/ip-pools/default/ranges
141472025-03-07T23:30:36.795ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource = Database uri = /v1/system/ip-pools/default/ranges
141482025-03-07T23:30:36.795ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141492025-03-07T23:30:36.797ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141502025-03-07T23:30:36.807ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
141512025-03-07T23:30:36.808ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
141522025-03-07T23:30:36.809ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource = Database uri = /v1/system/ip-pools/default/ranges
141532025-03-07T23:30:36.809ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141542025-03-07T23:30:36.810ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
141552025-03-07T23:30:36.829ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141562025-03-07T23:30:36.846ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/ranges
141572025-03-07T23:30:36.846ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 147737 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bee0b8c8-355d-4497-846a-875b40c2afe4 response_code = 404 uri = /v1/system/ip-pools/default/ranges
141582025-03-07T23:30:36.847ZINFOtest_unauthorized (external client test context): client received response status = 404
141592025-03-07T23:30:36.847ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/ranges
141602025-03-07T23:30:36.848ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141612025-03-07T23:30:36.848ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b uri = /v1/system/ip-pools/default/ranges
141622025-03-07T23:30:36.848ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b uri = /v1/system/ip-pools/default/ranges
141632025-03-07T23:30:36.848ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b uri = /v1/system/ip-pools/default/ranges
141642025-03-07T23:30:36.849ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b uri = /v1/system/ip-pools/default/ranges
141652025-03-07T23:30:36.849ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b resource = Database uri = /v1/system/ip-pools/default/ranges
141662025-03-07T23:30:36.849ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
141672025-03-07T23:30:36.849ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/ranges
141682025-03-07T23:30:36.849ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1362 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a3b0c67-ed74-438e-b22f-c0d5559cb56b response_code = 401 uri = /v1/system/ip-pools/default/ranges
141692025-03-07T23:30:36.850ZINFOtest_unauthorized (external client test context): client received response status = 401
141702025-03-07T23:30:36.850ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/ranges
141712025-03-07T23:30:36.850ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141722025-03-07T23:30:36.851ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de243080-1240-4ddb-8686-43b7a6e4c696 uri = /v1/system/ip-pools/default/ranges
141732025-03-07T23:30:36.851ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de243080-1240-4ddb-8686-43b7a6e4c696 uri = /v1/system/ip-pools/default/ranges
141742025-03-07T23:30:36.851ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de243080-1240-4ddb-8686-43b7a6e4c696 uri = /v1/system/ip-pools/default/ranges
141752025-03-07T23:30:36.851ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 592 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de243080-1240-4ddb-8686-43b7a6e4c696 response_code = 401 uri = /v1/system/ip-pools/default/ranges
141762025-03-07T23:30:36.852ZINFOtest_unauthorized (external client test context): client received response status = 401
141772025-03-07T23:30:36.852ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/ranges
141782025-03-07T23:30:36.852ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141792025-03-07T23:30:36.852ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 821aeb90-2275-4d72-a445-f0e534cc2f3a uri = /v1/system/ip-pools/default/ranges
141802025-03-07T23:30:36.852ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 821aeb90-2275-4d72-a445-f0e534cc2f3a uri = /v1/system/ip-pools/default/ranges
141812025-03-07T23:30:36.854ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1371:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1403:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 821aeb90-2275-4d72-a445-f0e534cc2f3a uri = /v1/system/ip-pools/default/ranges
141822025-03-07T23:30:36.854ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1876 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 821aeb90-2275-4d72-a445-f0e534cc2f3a response_code = 401 uri = /v1/system/ip-pools/default/ranges
141832025-03-07T23:30:36.854ZINFOtest_unauthorized (external client test context): client received response status = 401
141842025-03-07T23:30:36.855ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/ranges
141852025-03-07T23:30:36.855ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141862025-03-07T23:30:36.855ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ad25d49a-5d8d-46e3-8134-5dd4ad85627d uri = /v1/system/ip-pools/default/ranges
141872025-03-07T23:30:36.855ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 156 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ad25d49a-5d8d-46e3-8134-5dd4ad85627d response_code = 405 uri = /v1/system/ip-pools/default/ranges
141882025-03-07T23:30:36.855ZINFOtest_unauthorized (external client test context): client received response status = 405
141892025-03-07T23:30:36.856ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/ranges
141902025-03-07T23:30:36.856ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141912025-03-07T23:30:36.856ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 41c35747-bfe5-447b-a867-7d7b366496dc uri = /v1/system/ip-pools/default/ranges
141922025-03-07T23:30:36.856ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 151 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 41c35747-bfe5-447b-a867-7d7b366496dc response_code = 405 uri = /v1/system/ip-pools/default/ranges
141932025-03-07T23:30:36.856ZINFOtest_unauthorized (external client test context): client received response status = 405
141942025-03-07T23:30:36.857ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/ranges
141952025-03-07T23:30:36.857ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
141962025-03-07T23:30:36.857ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 123f9cfd-2a15-4d5d-9091-cf987b0097f9 uri = /v1/system/ip-pools/default/ranges
141972025-03-07T23:30:36.857ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 123f9cfd-2a15-4d5d-9091-cf987b0097f9 response_code = 405 uri = /v1/system/ip-pools/default/ranges
141982025-03-07T23:30:36.857ZINFOtest_unauthorized (external client test context): client received response status = 405
141992025-03-07T23:30:36.858ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/ranges
142002025-03-07T23:30:36.858ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142012025-03-07T23:30:36.858ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6dcc792e-78e5-40c1-9c43-77ed11d36650 uri = /v1/system/ip-pools/default/ranges
142022025-03-07T23:30:36.858ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6dcc792e-78e5-40c1-9c43-77ed11d36650 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142032025-03-07T23:30:36.858ZINFOtest_unauthorized (external client test context): client received response status = 405
142042025-03-07T23:30:36.859ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/ranges
142052025-03-07T23:30:36.859ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142062025-03-07T23:30:36.859ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = eee4af80-2574-4806-92de-c4ecf0d648d1 uri = /v1/system/ip-pools/default/ranges
142072025-03-07T23:30:36.859ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = eee4af80-2574-4806-92de-c4ecf0d648d1 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142082025-03-07T23:30:36.860ZINFOtest_unauthorized (external client test context): client received response status = 405
142092025-03-07T23:30:36.860ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/ranges
142102025-03-07T23:30:36.860ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142112025-03-07T23:30:36.860ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33ec5258-d9db-4285-aa6e-2311e3d717e4 uri = /v1/system/ip-pools/default/ranges
142122025-03-07T23:30:36.860ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 154 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33ec5258-d9db-4285-aa6e-2311e3d717e4 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142132025-03-07T23:30:36.860ZINFOtest_unauthorized (external client test context): client received response status = 405
142142025-03-07T23:30:36.861ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/ranges
142152025-03-07T23:30:36.861ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142162025-03-07T23:30:36.861ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8129f00b-f928-4960-9625-b0a56bc89059 uri = /v1/system/ip-pools/default/ranges
142172025-03-07T23:30:36.861ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 151 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8129f00b-f928-4960-9625-b0a56bc89059 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142182025-03-07T23:30:36.861ZINFOtest_unauthorized (external client test context): client received response status = 405
142192025-03-07T23:30:36.862ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/ranges
142202025-03-07T23:30:36.862ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142212025-03-07T23:30:36.862ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c0236fc0-8a4d-4eed-b057-d42ef825b3ea uri = /v1/system/ip-pools/default/ranges
142222025-03-07T23:30:36.862ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c0236fc0-8a4d-4eed-b057-d42ef825b3ea response_code = 405 uri = /v1/system/ip-pools/default/ranges
142232025-03-07T23:30:36.862ZINFOtest_unauthorized (external client test context): client received response status = 405
142242025-03-07T23:30:36.863ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/ranges
142252025-03-07T23:30:36.863ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142262025-03-07T23:30:36.863ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c93373af-a67a-4640-bda8-424817bc9640 uri = /v1/system/ip-pools/default/ranges
142272025-03-07T23:30:36.863ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 146 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c93373af-a67a-4640-bda8-424817bc9640 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142282025-03-07T23:30:36.863ZINFOtest_unauthorized (external client test context): client received response status = 405
142292025-03-07T23:30:36.868ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/ranges
142302025-03-07T23:30:36.869ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142312025-03-07T23:30:36.869ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 901562f8-430f-41ed-a2a4-f32139bbd8d3 uri = /v1/system/ip-pools/default/ranges
142322025-03-07T23:30:36.869ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 901562f8-430f-41ed-a2a4-f32139bbd8d3 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142332025-03-07T23:30:36.869ZINFOtest_unauthorized (external client test context): client received response status = 405
142342025-03-07T23:30:36.869ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/ranges
142352025-03-07T23:30:36.869ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142362025-03-07T23:30:36.869ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 05859158-ac4d-4a5c-b0e0-826f47cf25a0 uri = /v1/system/ip-pools/default/ranges
142372025-03-07T23:30:36.869ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 05859158-ac4d-4a5c-b0e0-826f47cf25a0 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142382025-03-07T23:30:36.870ZINFOtest_unauthorized (external client test context): client received response status = 405
142392025-03-07T23:30:36.870ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/ranges
142402025-03-07T23:30:36.870ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142412025-03-07T23:30:36.870ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ce6d5bc3-eae0-4e1f-8f58-ae90f8f2dbda uri = /v1/system/ip-pools/default/ranges
142422025-03-07T23:30:36.870ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ce6d5bc3-eae0-4e1f-8f58-ae90f8f2dbda response_code = 405 uri = /v1/system/ip-pools/default/ranges
142432025-03-07T23:30:36.870ZINFOtest_unauthorized (external client test context): client received response status = 405
142442025-03-07T23:30:36.870ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/ranges
142452025-03-07T23:30:36.870ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142462025-03-07T23:30:36.871ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3c538ca-2d53-4222-bca1-b6264d910150 uri = /v1/system/ip-pools/default/ranges
142472025-03-07T23:30:36.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3c538ca-2d53-4222-bca1-b6264d910150 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142482025-03-07T23:30:36.871ZINFOtest_unauthorized (external client test context): client received response status = 405
142492025-03-07T23:30:36.874ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/ranges
142502025-03-07T23:30:36.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142512025-03-07T23:30:36.874ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 26f88b9b-b65f-4387-a1ce-9c22ae68d3b7 uri = /v1/system/ip-pools/default/ranges
142522025-03-07T23:30:36.874ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 26f88b9b-b65f-4387-a1ce-9c22ae68d3b7 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142532025-03-07T23:30:36.874ZINFOtest_unauthorized (external client test context): client received response status = 405
142542025-03-07T23:30:36.875ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/ranges
142552025-03-07T23:30:36.875ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142562025-03-07T23:30:36.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d6881e86-77b8-45bd-b859-73187927d340 uri = /v1/system/ip-pools/default/ranges
142572025-03-07T23:30:36.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 111 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d6881e86-77b8-45bd-b859-73187927d340 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142582025-03-07T23:30:36.875ZINFOtest_unauthorized (external client test context): client received response status = 405
142592025-03-07T23:30:36.875ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/ranges
142602025-03-07T23:30:36.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142612025-03-07T23:30:36.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 56efc2e0-d166-40de-bd2e-1fde62899943 uri = /v1/system/ip-pools/default/ranges
142622025-03-07T23:30:36.880ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 56efc2e0-d166-40de-bd2e-1fde62899943 response_code = 405 uri = /v1/system/ip-pools/default/ranges
142632025-03-07T23:30:36.880ZINFOtest_unauthorized (external client test context): client received response status = 405
142642025-03-07T23:30:36.881ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/ranges
142652025-03-07T23:30:36.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges
142662025-03-07T23:30:36.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 uri = /v1/system/ip-pools/default/ranges
142672025-03-07T23:30:36.881ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 uri = /v1/system/ip-pools/default/ranges
142682025-03-07T23:30:36.892ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges
142692025-03-07T23:30:36.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142702025-03-07T23:30:36.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142712025-03-07T23:30:36.893ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142722025-03-07T23:30:36.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142732025-03-07T23:30:36.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142742025-03-07T23:30:36.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142752025-03-07T23:30:36.919ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
142762025-03-07T23:30:36.919ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
142772025-03-07T23:30:36.919ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142782025-03-07T23:30:36.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142792025-03-07T23:30:36.920ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142802025-03-07T23:30:36.931ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
142812025-03-07T23:30:36.933ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142822025-03-07T23:30:36.933ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142832025-03-07T23:30:36.934ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142842025-03-07T23:30:36.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
142852025-03-07T23:30:36.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
142862025-03-07T23:30:36.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142872025-03-07T23:30:36.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142882025-03-07T23:30:36.952ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142892025-03-07T23:30:36.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
142902025-03-07T23:30:36.955ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
142912025-03-07T23:30:36.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142922025-03-07T23:30:36.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142932025-03-07T23:30:36.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142942025-03-07T23:30:36.962ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
142952025-03-07T23:30:36.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
142962025-03-07T23:30:36.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
142972025-03-07T23:30:36.963ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
142982025-03-07T23:30:36.975ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
142992025-03-07T23:30:36.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
143002025-03-07T23:30:36.980ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 uri = /v1/system/ip-pools/default/ranges
143012025-03-07T23:30:36.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database uri = /v1/system/ip-pools/default/ranges
143022025-03-07T23:30:36.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
143032025-03-07T23:30:36.982ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143042025-03-07T23:30:36.988ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
143052025-03-07T23:30:36.988ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
143062025-03-07T23:30:36.988ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database uri = /v1/system/ip-pools/default/ranges
143072025-03-07T23:30:36.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
143082025-03-07T23:30:36.988ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143092025-03-07T23:30:36.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
143102025-03-07T23:30:36.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143112025-03-07T23:30:36.997ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database uri = /v1/system/ip-pools/default/ranges
143122025-03-07T23:30:36.997ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
143132025-03-07T23:30:36.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143142025-03-07T23:30:37.001ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges
143152025-03-07T23:30:37.001ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges
143162025-03-07T23:30:37.001ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database uri = /v1/system/ip-pools/default/ranges
143172025-03-07T23:30:37.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
143182025-03-07T23:30:37.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143192025-03-07T23:30:37.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges
143202025-03-07T23:30:37.024ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143212025-03-07T23:30:37.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database uri = /v1/system/ip-pools/default/ranges
143222025-03-07T23:30:37.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges
143232025-03-07T23:30:37.024ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges
143242025-03-07T23:30:37.028ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 146530 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18fa6d93-4f3b-451e-9fd2-1cb8c4a7e164 response_code = 200 uri = /v1/system/ip-pools/default/ranges
143252025-03-07T23:30:37.028ZINFOtest_unauthorized (external client test context): client received response status = 200
143262025-03-07T23:30:37.028ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/ranges/add
143272025-03-07T23:30:37.028ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools/default/ranges/add
143282025-03-07T23:30:37.028ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/ranges/add
143292025-03-07T23:30:37.028ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143302025-03-07T23:30:37.029ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 82c486bd-1fa5-4b4d-97af-109d8afbcf4e uri = /v1/system/ip-pools/default/ranges/add
143312025-03-07T23:30:37.029ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 82c486bd-1fa5-4b4d-97af-109d8afbcf4e response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143322025-03-07T23:30:37.029ZINFOtest_unauthorized (external client test context): client received response status = 405
143332025-03-07T23:30:37.029ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/ranges/add
143342025-03-07T23:30:37.029ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143352025-03-07T23:30:37.029ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7a7dacb-c29d-4bd2-abe3-78cba20669e7 uri = /v1/system/ip-pools/default/ranges/add
143362025-03-07T23:30:37.029ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7a7dacb-c29d-4bd2-abe3-78cba20669e7 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143372025-03-07T23:30:37.030ZINFOtest_unauthorized (external client test context): client received response status = 405
143382025-03-07T23:30:37.030ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/ranges/add
143392025-03-07T23:30:37.030ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143402025-03-07T23:30:37.030ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c7caafa-0cbd-4597-9bd5-48f8585f5a4f uri = /v1/system/ip-pools/default/ranges/add
143412025-03-07T23:30:37.030ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c7caafa-0cbd-4597-9bd5-48f8585f5a4f response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143422025-03-07T23:30:37.030ZINFOtest_unauthorized (external client test context): client received response status = 405
143432025-03-07T23:30:37.030ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/ranges/add
143442025-03-07T23:30:37.030ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143452025-03-07T23:30:37.030ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 00ecca5a-d068-4b97-bb50-ab054029d077 uri = /v1/system/ip-pools/default/ranges/add
143462025-03-07T23:30:37.030ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 00ecca5a-d068-4b97-bb50-ab054029d077 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143472025-03-07T23:30:37.031ZINFOtest_unauthorized (external client test context): client received response status = 405
143482025-03-07T23:30:37.031ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/ranges/add
143492025-03-07T23:30:37.031ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143502025-03-07T23:30:37.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7cad112b-1ef5-4d6b-9bc1-ab2061e1c2cd uri = /v1/system/ip-pools/default/ranges/add
143512025-03-07T23:30:37.031ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7cad112b-1ef5-4d6b-9bc1-ab2061e1c2cd response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143522025-03-07T23:30:37.031ZINFOtest_unauthorized (external client test context): client received response status = 405
143532025-03-07T23:30:37.031ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/ranges/add
143542025-03-07T23:30:37.031ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143552025-03-07T23:30:37.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ac04488b-08eb-4384-b212-e27ba0361b5c uri = /v1/system/ip-pools/default/ranges/add
143562025-03-07T23:30:37.031ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ac04488b-08eb-4384-b212-e27ba0361b5c response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143572025-03-07T23:30:37.032ZINFOtest_unauthorized (external client test context): client received response status = 405
143582025-03-07T23:30:37.032ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/ranges/add
143592025-03-07T23:30:37.032ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143602025-03-07T23:30:37.032ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 54a654a6-c4cc-4002-8314-1e43ab7370ce uri = /v1/system/ip-pools/default/ranges/add
143612025-03-07T23:30:37.032ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 54a654a6-c4cc-4002-8314-1e43ab7370ce response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143622025-03-07T23:30:37.033ZINFOtest_unauthorized (external client test context): client received response status = 405
143632025-03-07T23:30:37.033ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/ranges/add
143642025-03-07T23:30:37.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143652025-03-07T23:30:37.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17dc5851-b582-4ead-bf13-e62e064d2e56 uri = /v1/system/ip-pools/default/ranges/add
143662025-03-07T23:30:37.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17dc5851-b582-4ead-bf13-e62e064d2e56 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
143672025-03-07T23:30:37.033ZINFOtest_unauthorized (external client test context): client received response status = 405
143682025-03-07T23:30:37.034ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/ranges/add
143692025-03-07T23:30:37.034ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
143702025-03-07T23:30:37.034ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c uri = /v1/system/ip-pools/default/ranges/add
143712025-03-07T23:30:37.034ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c uri = /v1/system/ip-pools/default/ranges/add
143722025-03-07T23:30:37.034ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/ranges/add
143732025-03-07T23:30:37.034ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143742025-03-07T23:30:37.034ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143752025-03-07T23:30:37.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143762025-03-07T23:30:37.038ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143772025-03-07T23:30:37.038ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143782025-03-07T23:30:37.039ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143792025-03-07T23:30:37.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
143802025-03-07T23:30:37.044ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
143812025-03-07T23:30:37.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143822025-03-07T23:30:37.044ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143832025-03-07T23:30:37.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143842025-03-07T23:30:37.049ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
143852025-03-07T23:30:37.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143862025-03-07T23:30:37.049ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143872025-03-07T23:30:37.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143882025-03-07T23:30:37.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
143892025-03-07T23:30:37.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
143902025-03-07T23:30:37.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143912025-03-07T23:30:37.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143922025-03-07T23:30:37.065ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143932025-03-07T23:30:37.085ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
143942025-03-07T23:30:37.085ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
143952025-03-07T23:30:37.085ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
143962025-03-07T23:30:37.085ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
143972025-03-07T23:30:37.116ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
143982025-03-07T23:30:37.127ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
143992025-03-07T23:30:37.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
144002025-03-07T23:30:37.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
144012025-03-07T23:30:37.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
144022025-03-07T23:30:37.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
144032025-03-07T23:30:37.138ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
144042025-03-07T23:30:37.138ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c uri = /v1/system/ip-pools/default/ranges/add
144052025-03-07T23:30:37.138ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource = Database uri = /v1/system/ip-pools/default/ranges/add
144062025-03-07T23:30:37.138ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
144072025-03-07T23:30:37.140ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
144082025-03-07T23:30:37.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
144092025-03-07T23:30:37.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
144102025-03-07T23:30:37.158ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
144112025-03-07T23:30:37.160ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
144122025-03-07T23:30:37.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
144132025-03-07T23:30:37.175ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
144142025-03-07T23:30:37.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource = Database uri = /v1/system/ip-pools/default/ranges/add
144152025-03-07T23:30:37.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
144162025-03-07T23:30:37.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
144172025-03-07T23:30:37.175ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
144182025-03-07T23:30:37.175ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
144192025-03-07T23:30:37.190ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
144202025-03-07T23:30:37.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/ranges/add
144212025-03-07T23:30:37.221ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 187111 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a575b264-7292-4ba1-b286-d87001f1878c response_code = 404 uri = /v1/system/ip-pools/default/ranges/add
144222025-03-07T23:30:37.225ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
144232025-03-07T23:30:37.225ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
144242025-03-07T23:30:37.226ZINFOtest_unauthorized (external client test context): client received response status = 404
144252025-03-07T23:30:37.226ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/ranges/add
144262025-03-07T23:30:37.226ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144272025-03-07T23:30:37.227ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 uri = /v1/system/ip-pools/default/ranges/add
144282025-03-07T23:30:37.227ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 uri = /v1/system/ip-pools/default/ranges/add
144292025-03-07T23:30:37.227ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 uri = /v1/system/ip-pools/default/ranges/add
144302025-03-07T23:30:37.227ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 uri = /v1/system/ip-pools/default/ranges/add
144312025-03-07T23:30:37.228ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 resource = Database uri = /v1/system/ip-pools/default/ranges/add
144322025-03-07T23:30:37.228ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
144332025-03-07T23:30:37.228ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/ranges/add
144342025-03-07T23:30:37.229ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1773 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6becb0d5-3eb9-420d-8a24-d13ff0331769 response_code = 401 uri = /v1/system/ip-pools/default/ranges/add
144352025-03-07T23:30:37.229ZINFOtest_unauthorized (external client test context): client received response status = 401
144362025-03-07T23:30:37.229ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/ranges/add
144372025-03-07T23:30:37.231ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144382025-03-07T23:30:37.231ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 09f57a60-636c-49bd-ad49-fd4468fce877 uri = /v1/system/ip-pools/default/ranges/add
144392025-03-07T23:30:37.232ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 09f57a60-636c-49bd-ad49-fd4468fce877 uri = /v1/system/ip-pools/default/ranges/add
144402025-03-07T23:30:37.232ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 09f57a60-636c-49bd-ad49-fd4468fce877 uri = /v1/system/ip-pools/default/ranges/add
144412025-03-07T23:30:37.236ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 5091 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 09f57a60-636c-49bd-ad49-fd4468fce877 response_code = 401 uri = /v1/system/ip-pools/default/ranges/add
144422025-03-07T23:30:37.237ZINFOtest_unauthorized (external client test context): client received response status = 401
144432025-03-07T23:30:37.237ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/ranges/add
144442025-03-07T23:30:37.237ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144452025-03-07T23:30:37.237ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7dd8c816-a2d1-4888-973d-59630ab8142c uri = /v1/system/ip-pools/default/ranges/add
144462025-03-07T23:30:37.237ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7dd8c816-a2d1-4888-973d-59630ab8142c uri = /v1/system/ip-pools/default/ranges/add
144472025-03-07T23:30:37.239ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1414:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1427:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_add::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7dd8c816-a2d1-4888-973d-59630ab8142c uri = /v1/system/ip-pools/default/ranges/add
144482025-03-07T23:30:37.239ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1392 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7dd8c816-a2d1-4888-973d-59630ab8142c response_code = 401 uri = /v1/system/ip-pools/default/ranges/add
144492025-03-07T23:30:37.239ZINFOtest_unauthorized (external client test context): client received response status = 401
144502025-03-07T23:30:37.239ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/ranges/add
144512025-03-07T23:30:37.240ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144522025-03-07T23:30:37.240ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1e6f3330-d893-4f55-8253-de6bed97c683 uri = /v1/system/ip-pools/default/ranges/add
144532025-03-07T23:30:37.240ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1e6f3330-d893-4f55-8253-de6bed97c683 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144542025-03-07T23:30:37.240ZINFOtest_unauthorized (external client test context): client received response status = 405
144552025-03-07T23:30:37.240ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/ranges/add
144562025-03-07T23:30:37.240ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144572025-03-07T23:30:37.241ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = add8ee42-6797-4b60-8727-34fb374ef0a3 uri = /v1/system/ip-pools/default/ranges/add
144582025-03-07T23:30:37.241ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = add8ee42-6797-4b60-8727-34fb374ef0a3 response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144592025-03-07T23:30:37.241ZINFOtest_unauthorized (external client test context): client received response status = 405
144602025-03-07T23:30:37.242ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/ranges/add
144612025-03-07T23:30:37.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144622025-03-07T23:30:37.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = da6dc139-9e53-4cab-9d9e-4ff834122b9f uri = /v1/system/ip-pools/default/ranges/add
144632025-03-07T23:30:37.242ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = da6dc139-9e53-4cab-9d9e-4ff834122b9f response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144642025-03-07T23:30:37.242ZINFOtest_unauthorized (external client test context): client received response status = 405
144652025-03-07T23:30:37.242ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/ranges/add
144662025-03-07T23:30:37.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144672025-03-07T23:30:37.243ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 44879d6d-c774-42b5-bdcf-412ad1f791fc uri = /v1/system/ip-pools/default/ranges/add
144682025-03-07T23:30:37.243ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 44879d6d-c774-42b5-bdcf-412ad1f791fc response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144692025-03-07T23:30:37.243ZINFOtest_unauthorized (external client test context): client received response status = 405
144702025-03-07T23:30:37.243ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/ranges/add
144712025-03-07T23:30:37.243ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144722025-03-07T23:30:37.243ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6e2053d7-1b1a-423c-be27-ab0c4f8f69fb uri = /v1/system/ip-pools/default/ranges/add
144732025-03-07T23:30:37.243ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6e2053d7-1b1a-423c-be27-ab0c4f8f69fb response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144742025-03-07T23:30:37.244ZINFOtest_unauthorized (external client test context): client received response status = 405
144752025-03-07T23:30:37.244ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/ranges/add
144762025-03-07T23:30:37.244ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144772025-03-07T23:30:37.244ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ae620547-676f-4e5c-9407-d58c981f738d uri = /v1/system/ip-pools/default/ranges/add
144782025-03-07T23:30:37.244ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ae620547-676f-4e5c-9407-d58c981f738d response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144792025-03-07T23:30:37.244ZINFOtest_unauthorized (external client test context): client received response status = 405
144802025-03-07T23:30:37.244ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/ranges/add
144812025-03-07T23:30:37.244ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144822025-03-07T23:30:37.244ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c330feab-7a67-4d2c-ac47-f0b6c827608d uri = /v1/system/ip-pools/default/ranges/add
144832025-03-07T23:30:37.244ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c330feab-7a67-4d2c-ac47-f0b6c827608d response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144842025-03-07T23:30:37.245ZINFOtest_unauthorized (external client test context): client received response status = 405
144852025-03-07T23:30:37.246ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/ranges/add
144862025-03-07T23:30:37.246ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/add
144872025-03-07T23:30:37.246ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f0c5fe0a-593a-4850-aaac-2ecfdf4f398e uri = /v1/system/ip-pools/default/ranges/add
144882025-03-07T23:30:37.246ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f0c5fe0a-593a-4850-aaac-2ecfdf4f398e response_code = 405 uri = /v1/system/ip-pools/default/ranges/add
144892025-03-07T23:30:37.246ZINFOtest_unauthorized (external client test context): client received response status = 405
144902025-03-07T23:30:37.246ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/ranges/add
144912025-03-07T23:30:37.246ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/ranges/remove
144922025-03-07T23:30:37.246ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools/default/ranges/remove
144932025-03-07T23:30:37.246ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/ranges/remove
144942025-03-07T23:30:37.246ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
144952025-03-07T23:30:37.246ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bc4d7a7-e450-4ab1-8a3b-66bddedc5af0 uri = /v1/system/ip-pools/default/ranges/remove
144962025-03-07T23:30:37.246ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bc4d7a7-e450-4ab1-8a3b-66bddedc5af0 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
144972025-03-07T23:30:37.247ZINFOtest_unauthorized (external client test context): client received response status = 405
144982025-03-07T23:30:37.247ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/ranges/remove
144992025-03-07T23:30:37.247ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145002025-03-07T23:30:37.247ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 241ed5af-a4cd-4ce6-aed9-a87b1b6a7c86 uri = /v1/system/ip-pools/default/ranges/remove
145012025-03-07T23:30:37.247ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 241ed5af-a4cd-4ce6-aed9-a87b1b6a7c86 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145022025-03-07T23:30:37.248ZINFOtest_unauthorized (external client test context): client received response status = 405
145032025-03-07T23:30:37.248ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/ranges/remove
145042025-03-07T23:30:37.248ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145052025-03-07T23:30:37.248ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50c2640d-9c6e-4d40-b95b-fa04c529d386 uri = /v1/system/ip-pools/default/ranges/remove
145062025-03-07T23:30:37.248ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50c2640d-9c6e-4d40-b95b-fa04c529d386 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145072025-03-07T23:30:37.248ZINFOtest_unauthorized (external client test context): client received response status = 405
145082025-03-07T23:30:37.248ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/ranges/remove
145092025-03-07T23:30:37.248ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145102025-03-07T23:30:37.248ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11f965bd-39a5-4dd4-8cee-114c16433a50 uri = /v1/system/ip-pools/default/ranges/remove
145112025-03-07T23:30:37.248ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11f965bd-39a5-4dd4-8cee-114c16433a50 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145122025-03-07T23:30:37.249ZINFOtest_unauthorized (external client test context): client received response status = 405
145132025-03-07T23:30:37.249ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/ranges/remove
145142025-03-07T23:30:37.249ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145152025-03-07T23:30:37.249ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1938e643-33ce-4d87-a019-a5bc3bc8e2f8 uri = /v1/system/ip-pools/default/ranges/remove
145162025-03-07T23:30:37.249ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1938e643-33ce-4d87-a019-a5bc3bc8e2f8 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145172025-03-07T23:30:37.249ZINFOtest_unauthorized (external client test context): client received response status = 405
145182025-03-07T23:30:37.249ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/ranges/remove
145192025-03-07T23:30:37.249ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145202025-03-07T23:30:37.249ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c9fe275f-8e8d-4822-9fe2-536599e104ff uri = /v1/system/ip-pools/default/ranges/remove
145212025-03-07T23:30:37.249ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c9fe275f-8e8d-4822-9fe2-536599e104ff response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145222025-03-07T23:30:37.250ZINFOtest_unauthorized (external client test context): client received response status = 405
145232025-03-07T23:30:37.250ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/ranges/remove
145242025-03-07T23:30:37.250ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145252025-03-07T23:30:37.250ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d48ece2e-d495-454a-b5d7-9c3adf99b6c0 uri = /v1/system/ip-pools/default/ranges/remove
145262025-03-07T23:30:37.250ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d48ece2e-d495-454a-b5d7-9c3adf99b6c0 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145272025-03-07T23:30:37.250ZINFOtest_unauthorized (external client test context): client received response status = 405
145282025-03-07T23:30:37.250ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/ranges/remove
145292025-03-07T23:30:37.250ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145302025-03-07T23:30:37.251ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 418a18fd-160c-4d91-8b3e-9d97094c8810 uri = /v1/system/ip-pools/default/ranges/remove
145312025-03-07T23:30:37.251ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 418a18fd-160c-4d91-8b3e-9d97094c8810 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
145322025-03-07T23:30:37.252ZINFOtest_unauthorized (external client test context): client received response status = 405
145332025-03-07T23:30:37.252ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/ranges/remove
145342025-03-07T23:30:37.252ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145352025-03-07T23:30:37.252ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f uri = /v1/system/ip-pools/default/ranges/remove
145362025-03-07T23:30:37.252ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f uri = /v1/system/ip-pools/default/ranges/remove
145372025-03-07T23:30:37.252ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/ranges/remove
145382025-03-07T23:30:37.252ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145392025-03-07T23:30:37.252ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145402025-03-07T23:30:37.253ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145412025-03-07T23:30:37.261ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
145422025-03-07T23:30:37.266ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145432025-03-07T23:30:37.266ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145442025-03-07T23:30:37.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145452025-03-07T23:30:37.271ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
145462025-03-07T23:30:37.271ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
145472025-03-07T23:30:37.271ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145482025-03-07T23:30:37.271ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145492025-03-07T23:30:37.272ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145502025-03-07T23:30:37.275ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
145512025-03-07T23:30:37.275ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145522025-03-07T23:30:37.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145532025-03-07T23:30:37.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145542025-03-07T23:30:37.279ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
145552025-03-07T23:30:37.286ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
145562025-03-07T23:30:37.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145572025-03-07T23:30:37.286ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145582025-03-07T23:30:37.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145592025-03-07T23:30:37.291ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
145602025-03-07T23:30:37.292ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
145612025-03-07T23:30:37.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145622025-03-07T23:30:37.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145632025-03-07T23:30:37.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145642025-03-07T23:30:37.303ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
145652025-03-07T23:30:37.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
145662025-03-07T23:30:37.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
145672025-03-07T23:30:37.304ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
145682025-03-07T23:30:37.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
145692025-03-07T23:30:37.318ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
145702025-03-07T23:30:37.318ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f uri = /v1/system/ip-pools/default/ranges/remove
145712025-03-07T23:30:37.318ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource = Database uri = /v1/system/ip-pools/default/ranges/remove
145722025-03-07T23:30:37.318ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
145732025-03-07T23:30:37.319ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/remove
145742025-03-07T23:30:37.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/remove
145752025-03-07T23:30:37.323ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/remove
145762025-03-07T23:30:37.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource = Database uri = /v1/system/ip-pools/default/ranges/remove
145772025-03-07T23:30:37.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
145782025-03-07T23:30:37.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/remove
145792025-03-07T23:30:37.327ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
145802025-03-07T23:30:37.361ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/ranges/remove
145812025-03-07T23:30:37.362ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 109738 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51036395-5144-422f-8342-c7dee6da663f response_code = 404 uri = /v1/system/ip-pools/default/ranges/remove
145822025-03-07T23:30:37.362ZINFOtest_unauthorized (external client test context): client received response status = 404
145832025-03-07T23:30:37.363ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/ranges/remove
145842025-03-07T23:30:37.363ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145852025-03-07T23:30:37.363ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 uri = /v1/system/ip-pools/default/ranges/remove
145862025-03-07T23:30:37.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 uri = /v1/system/ip-pools/default/ranges/remove
145872025-03-07T23:30:37.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 uri = /v1/system/ip-pools/default/ranges/remove
145882025-03-07T23:30:37.364ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 uri = /v1/system/ip-pools/default/ranges/remove
145892025-03-07T23:30:37.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 resource = Database uri = /v1/system/ip-pools/default/ranges/remove
145902025-03-07T23:30:37.364ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/remove
145912025-03-07T23:30:37.365ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/ranges/remove
145922025-03-07T23:30:37.365ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1833 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 577c4c89-9ce1-426f-bb10-e951313f2707 response_code = 401 uri = /v1/system/ip-pools/default/ranges/remove
145932025-03-07T23:30:37.365ZINFOtest_unauthorized (external client test context): client received response status = 401
145942025-03-07T23:30:37.366ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/ranges/remove
145952025-03-07T23:30:37.366ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
145962025-03-07T23:30:37.366ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61e12180-7ab2-42b3-9a3e-4c5cc383f2c4 uri = /v1/system/ip-pools/default/ranges/remove
145972025-03-07T23:30:37.367ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61e12180-7ab2-42b3-9a3e-4c5cc383f2c4 uri = /v1/system/ip-pools/default/ranges/remove
145982025-03-07T23:30:37.368ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61e12180-7ab2-42b3-9a3e-4c5cc383f2c4 uri = /v1/system/ip-pools/default/ranges/remove
145992025-03-07T23:30:37.368ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1851 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61e12180-7ab2-42b3-9a3e-4c5cc383f2c4 response_code = 401 uri = /v1/system/ip-pools/default/ranges/remove
146002025-03-07T23:30:37.369ZINFOtest_unauthorized (external client test context): client received response status = 401
146012025-03-07T23:30:37.369ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/ranges/remove
146022025-03-07T23:30:37.369ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146032025-03-07T23:30:37.369ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 923c3fe7-e8d0-43bf-a42c-bafbc2872229 uri = /v1/system/ip-pools/default/ranges/remove
146042025-03-07T23:30:37.369ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 923c3fe7-e8d0-43bf-a42c-bafbc2872229 uri = /v1/system/ip-pools/default/ranges/remove
146052025-03-07T23:30:37.371ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1438:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1450:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_range_remove::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 923c3fe7-e8d0-43bf-a42c-bafbc2872229 uri = /v1/system/ip-pools/default/ranges/remove
146062025-03-07T23:30:37.371ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2106 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 923c3fe7-e8d0-43bf-a42c-bafbc2872229 response_code = 401 uri = /v1/system/ip-pools/default/ranges/remove
146072025-03-07T23:30:37.371ZINFOtest_unauthorized (external client test context): client received response status = 401
146082025-03-07T23:30:37.372ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/ranges/remove
146092025-03-07T23:30:37.372ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146102025-03-07T23:30:37.372ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f0e54eac-b7c2-489d-975e-4211b312dd1b uri = /v1/system/ip-pools/default/ranges/remove
146112025-03-07T23:30:37.372ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f0e54eac-b7c2-489d-975e-4211b312dd1b response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146122025-03-07T23:30:37.373ZINFOtest_unauthorized (external client test context): client received response status = 405
146132025-03-07T23:30:37.373ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/ranges/remove
146142025-03-07T23:30:37.373ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146152025-03-07T23:30:37.374ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3d3f098c-f504-45b2-b536-8d07c0e207e9 uri = /v1/system/ip-pools/default/ranges/remove
146162025-03-07T23:30:37.374ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3d3f098c-f504-45b2-b536-8d07c0e207e9 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146172025-03-07T23:30:37.374ZINFOtest_unauthorized (external client test context): client received response status = 405
146182025-03-07T23:30:37.374ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/ranges/remove
146192025-03-07T23:30:37.374ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146202025-03-07T23:30:37.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5602b530-64cd-465d-b3d7-4c707f6446c1 uri = /v1/system/ip-pools/default/ranges/remove
146212025-03-07T23:30:37.375ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 169 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5602b530-64cd-465d-b3d7-4c707f6446c1 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146222025-03-07T23:30:37.375ZINFOtest_unauthorized (external client test context): client received response status = 405
146232025-03-07T23:30:37.375ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/ranges/remove
146242025-03-07T23:30:37.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146252025-03-07T23:30:37.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 277ba27e-281c-4dc5-b2cb-b95d13e4315e uri = /v1/system/ip-pools/default/ranges/remove
146262025-03-07T23:30:37.376ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 277ba27e-281c-4dc5-b2cb-b95d13e4315e response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146272025-03-07T23:30:37.376ZINFOtest_unauthorized (external client test context): client received response status = 405
146282025-03-07T23:30:37.376ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/ranges/remove
146292025-03-07T23:30:37.376ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146302025-03-07T23:30:37.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b4bcccf6-a4d9-45aa-bb85-2c4c65406478 uri = /v1/system/ip-pools/default/ranges/remove
146312025-03-07T23:30:37.377ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 139 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b4bcccf6-a4d9-45aa-bb85-2c4c65406478 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146322025-03-07T23:30:37.377ZINFOtest_unauthorized (external client test context): client received response status = 405
146332025-03-07T23:30:37.377ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/ranges/remove
146342025-03-07T23:30:37.377ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146352025-03-07T23:30:37.377ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = eadc29f6-d70b-431e-bb60-e6ea3222b783 uri = /v1/system/ip-pools/default/ranges/remove
146362025-03-07T23:30:37.378ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = eadc29f6-d70b-431e-bb60-e6ea3222b783 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146372025-03-07T23:30:37.378ZINFOtest_unauthorized (external client test context): client received response status = 405
146382025-03-07T23:30:37.378ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/ranges/remove
146392025-03-07T23:30:37.378ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146402025-03-07T23:30:37.378ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c02e0c17-5e82-4b69-9050-ed163aca04d7 uri = /v1/system/ip-pools/default/ranges/remove
146412025-03-07T23:30:37.383ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 5188 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c02e0c17-5e82-4b69-9050-ed163aca04d7 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146422025-03-07T23:30:37.387ZINFOtest_unauthorized (external client test context): client received response status = 405
146432025-03-07T23:30:37.387ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/ranges/remove
146442025-03-07T23:30:37.387ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/ranges/remove
146452025-03-07T23:30:37.387ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5c42ef6d-e874-4b77-808c-a9bdb1ce33d4 uri = /v1/system/ip-pools/default/ranges/remove
146462025-03-07T23:30:37.387ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 181 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5c42ef6d-e874-4b77-808c-a9bdb1ce33d4 response_code = 405 uri = /v1/system/ip-pools/default/ranges/remove
146472025-03-07T23:30:37.388ZINFOtest_unauthorized (external client test context): client received response status = 405
146482025-03-07T23:30:37.388ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/ranges/remove
146492025-03-07T23:30:37.388ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools/default/utilization
146502025-03-07T23:30:37.388ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools/default/utilization
146512025-03-07T23:30:37.388ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
146522025-03-07T23:30:37.388ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d uri = /v1/system/ip-pools/default/utilization
146532025-03-07T23:30:37.389ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d uri = /v1/system/ip-pools/default/utilization
146542025-03-07T23:30:37.389ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/utilization
146552025-03-07T23:30:37.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
146562025-03-07T23:30:37.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146572025-03-07T23:30:37.390ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146582025-03-07T23:30:37.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
146592025-03-07T23:30:37.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146602025-03-07T23:30:37.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146612025-03-07T23:30:37.414ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
146622025-03-07T23:30:37.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
146632025-03-07T23:30:37.414ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
146642025-03-07T23:30:37.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
146652025-03-07T23:30:37.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146662025-03-07T23:30:37.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146672025-03-07T23:30:37.416ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
146682025-03-07T23:30:37.417ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 41048eb5-93c6-46c5-a88b-f6c163c48da2 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
146692025-03-07T23:30:37.417ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 41048eb5-93c6-46c5-a88b-f6c163c48da2 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
146702025-03-07T23:30:37.418ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 41048eb5-93c6-46c5-a88b-f6c163c48da2 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
146712025-03-07T23:30:37.418ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 41048eb5-93c6-46c5-a88b-f6c163c48da2 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
146722025-03-07T23:30:37.424ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
146732025-03-07T23:30:37.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
146742025-03-07T23:30:37.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146752025-03-07T23:30:37.426ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146762025-03-07T23:30:37.427ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9491 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 41048eb5-93c6-46c5-a88b-f6c163c48da2 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
146772025-03-07T23:30:37.427ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "41048eb5-93c6-46c5-a88b-f6c163c48da2", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:36 GMT"} })
146782025-03-07T23:30:37.427ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
146792025-03-07T23:30:37.428ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5e59cfb-9d01-4b53-9a32-7db4c72325fa uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
146802025-03-07T23:30:37.428ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5e59cfb-9d01-4b53-9a32-7db4c72325fa resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
146812025-03-07T23:30:37.428ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5e59cfb-9d01-4b53-9a32-7db4c72325fa roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
146822025-03-07T23:30:37.429ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5e59cfb-9d01-4b53-9a32-7db4c72325fa resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
146832025-03-07T23:30:37.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
146842025-03-07T23:30:37.433ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
146852025-03-07T23:30:37.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
146862025-03-07T23:30:37.433ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146872025-03-07T23:30:37.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146882025-03-07T23:30:37.440ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8292 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b5e59cfb-9d01-4b53-9a32-7db4c72325fa response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
146892025-03-07T23:30:37.440ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
146902025-03-07T23:30:37.440ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
146912025-03-07T23:30:37.440ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
146922025-03-07T23:30:37.440ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
146932025-03-07T23:30:37.440ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
146942025-03-07T23:30:37.440ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5e59cfb-9d01-4b53-9a32-7db4c72325fa", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:36 GMT"} })
146952025-03-07T23:30:37.440ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
146962025-03-07T23:30:37.440ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
146972025-03-07T23:30:37.440ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
146982025-03-07T23:30:37.440ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
146992025-03-07T23:30:37.441ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147002025-03-07T23:30:37.441ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147012025-03-07T23:30:37.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147022025-03-07T23:30:37.451ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
147032025-03-07T23:30:37.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
147042025-03-07T23:30:37.456ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d uri = /v1/system/ip-pools/default/utilization
147052025-03-07T23:30:37.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147062025-03-07T23:30:37.457ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147072025-03-07T23:30:37.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147082025-03-07T23:30:37.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147092025-03-07T23:30:37.466ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147102025-03-07T23:30:37.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147112025-03-07T23:30:37.466ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147122025-03-07T23:30:37.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147132025-03-07T23:30:37.479ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147142025-03-07T23:30:37.501ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147152025-03-07T23:30:37.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147162025-03-07T23:30:37.502ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147172025-03-07T23:30:37.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147182025-03-07T23:30:37.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147192025-03-07T23:30:37.502ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147202025-03-07T23:30:37.508ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147212025-03-07T23:30:37.516ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147222025-03-07T23:30:37.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147232025-03-07T23:30:37.516ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147242025-03-07T23:30:37.516ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147252025-03-07T23:30:37.528ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147262025-03-07T23:30:37.528ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147272025-03-07T23:30:37.528ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147282025-03-07T23:30:37.528ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147292025-03-07T23:30:37.529ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147302025-03-07T23:30:37.533ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147312025-03-07T23:30:37.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147322025-03-07T23:30:37.540ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147332025-03-07T23:30:37.540ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147342025-03-07T23:30:37.540ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147352025-03-07T23:30:37.540ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147362025-03-07T23:30:37.541ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147372025-03-07T23:30:37.544ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
147382025-03-07T23:30:37.552ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147392025-03-07T23:30:37.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database uri = /v1/system/ip-pools/default/utilization
147402025-03-07T23:30:37.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147412025-03-07T23:30:37.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147422025-03-07T23:30:37.558ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 169234 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6f57d83f-2d81-436b-9c35-ac6c54ffe82d response_code = 200 uri = /v1/system/ip-pools/default/utilization
147432025-03-07T23:30:37.558ZINFOtest_unauthorized (external client test context): client received response status = 200
147442025-03-07T23:30:37.558ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools/default/utilization
147452025-03-07T23:30:37.558ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
147462025-03-07T23:30:37.559ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 uri = /v1/system/ip-pools/default/utilization
147472025-03-07T23:30:37.559ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 uri = /v1/system/ip-pools/default/utilization
147482025-03-07T23:30:37.559ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools/default/utilization
147492025-03-07T23:30:37.559ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147502025-03-07T23:30:37.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147512025-03-07T23:30:37.560ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147522025-03-07T23:30:37.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
147532025-03-07T23:30:37.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
147542025-03-07T23:30:37.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147552025-03-07T23:30:37.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147562025-03-07T23:30:37.563ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147572025-03-07T23:30:37.565ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
147582025-03-07T23:30:37.566ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
147592025-03-07T23:30:37.566ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
147602025-03-07T23:30:37.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
147612025-03-07T23:30:37.567ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
147622025-03-07T23:30:37.567ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
147632025-03-07T23:30:37.567ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147642025-03-07T23:30:37.567ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147652025-03-07T23:30:37.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147662025-03-07T23:30:37.569ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
147672025-03-07T23:30:37.570ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147682025-03-07T23:30:37.570ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147692025-03-07T23:30:37.570ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147702025-03-07T23:30:37.572ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
147712025-03-07T23:30:37.579ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
147722025-03-07T23:30:37.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147732025-03-07T23:30:37.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147742025-03-07T23:30:37.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147752025-03-07T23:30:37.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
147762025-03-07T23:30:37.582ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
147772025-03-07T23:30:37.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147782025-03-07T23:30:37.582ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147792025-03-07T23:30:37.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147802025-03-07T23:30:37.586ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
147812025-03-07T23:30:37.586ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
147822025-03-07T23:30:37.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
147832025-03-07T23:30:37.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
147842025-03-07T23:30:37.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
147852025-03-07T23:30:37.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
147862025-03-07T23:30:37.593ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 uri = /v1/system/ip-pools/default/utilization
147872025-03-07T23:30:37.593ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource = Database uri = /v1/system/ip-pools/default/utilization
147882025-03-07T23:30:37.593ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147892025-03-07T23:30:37.594ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147902025-03-07T23:30:37.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
147912025-03-07T23:30:37.596ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
147922025-03-07T23:30:37.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource = Database uri = /v1/system/ip-pools/default/utilization
147932025-03-07T23:30:37.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147942025-03-07T23:30:37.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
147952025-03-07T23:30:37.602ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
147962025-03-07T23:30:37.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("default") }) uri = /v1/system/ip-pools/default/utilization
147972025-03-07T23:30:37.613ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "default" error_message_internal = not found: ip-pool with name "default" latency_us = 54418 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0385f26-5fd3-472a-8296-8322cce5d902 response_code = 404 uri = /v1/system/ip-pools/default/utilization
147982025-03-07T23:30:37.614ZINFOtest_unauthorized (external client test context): client received response status = 404
147992025-03-07T23:30:37.614ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools/default/utilization
148002025-03-07T23:30:37.615ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148012025-03-07T23:30:37.615ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 uri = /v1/system/ip-pools/default/utilization
148022025-03-07T23:30:37.615ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 uri = /v1/system/ip-pools/default/utilization
148032025-03-07T23:30:37.616ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 uri = /v1/system/ip-pools/default/utilization
148042025-03-07T23:30:37.616ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 uri = /v1/system/ip-pools/default/utilization
148052025-03-07T23:30:37.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 resource = Database uri = /v1/system/ip-pools/default/utilization
148062025-03-07T23:30:37.616ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
148072025-03-07T23:30:37.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools/default/utilization
148082025-03-07T23:30:37.617ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1585 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18caf29c-af02-408a-8bc3-229badb0e7a3 response_code = 401 uri = /v1/system/ip-pools/default/utilization
148092025-03-07T23:30:37.617ZINFOtest_unauthorized (external client test context): client received response status = 401
148102025-03-07T23:30:37.617ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools/default/utilization
148112025-03-07T23:30:37.618ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148122025-03-07T23:30:37.618ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff96f1ee-c235-4508-9bcd-2793eab6787f uri = /v1/system/ip-pools/default/utilization
148132025-03-07T23:30:37.618ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff96f1ee-c235-4508-9bcd-2793eab6787f uri = /v1/system/ip-pools/default/utilization
148142025-03-07T23:30:37.618ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff96f1ee-c235-4508-9bcd-2793eab6787f uri = /v1/system/ip-pools/default/utilization
148152025-03-07T23:30:37.618ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 581 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff96f1ee-c235-4508-9bcd-2793eab6787f response_code = 401 uri = /v1/system/ip-pools/default/utilization
148162025-03-07T23:30:37.619ZINFOtest_unauthorized (external client test context): client received response status = 401
148172025-03-07T23:30:37.619ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools/default/utilization
148182025-03-07T23:30:37.619ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148192025-03-07T23:30:37.620ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8c720c97-dcae-41ae-ba66-98ec2b9f1b8c uri = /v1/system/ip-pools/default/utilization
148202025-03-07T23:30:37.620ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8c720c97-dcae-41ae-ba66-98ec2b9f1b8c uri = /v1/system/ip-pools/default/utilization
148212025-03-07T23:30:37.622ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1200:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolUtilization>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1214:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolUtilization>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_utilization_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPoolUtilization>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8c720c97-dcae-41ae-ba66-98ec2b9f1b8c uri = /v1/system/ip-pools/default/utilization
148222025-03-07T23:30:37.622ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1619 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8c720c97-dcae-41ae-ba66-98ec2b9f1b8c response_code = 401 uri = /v1/system/ip-pools/default/utilization
148232025-03-07T23:30:37.622ZINFOtest_unauthorized (external client test context): client received response status = 401
148242025-03-07T23:30:37.622ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools/default/utilization
148252025-03-07T23:30:37.622ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148262025-03-07T23:30:37.622ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c3be5193-a3bb-4328-bde5-2b5237e0291f uri = /v1/system/ip-pools/default/utilization
148272025-03-07T23:30:37.622ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c3be5193-a3bb-4328-bde5-2b5237e0291f response_code = 405 uri = /v1/system/ip-pools/default/utilization
148282025-03-07T23:30:37.622ZINFOtest_unauthorized (external client test context): client received response status = 405
148292025-03-07T23:30:37.626ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools/default/utilization
148302025-03-07T23:30:37.626ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148312025-03-07T23:30:37.626ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 01fb27dc-2f8c-49ad-a5b6-0c74ac5079c8 uri = /v1/system/ip-pools/default/utilization
148322025-03-07T23:30:37.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 191 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 01fb27dc-2f8c-49ad-a5b6-0c74ac5079c8 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148332025-03-07T23:30:37.626ZINFOtest_unauthorized (external client test context): client received response status = 405
148342025-03-07T23:30:37.626ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools/default/utilization
148352025-03-07T23:30:37.626ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148362025-03-07T23:30:37.626ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 34277157-99ed-4b7f-a69a-baf0ca16c704 uri = /v1/system/ip-pools/default/utilization
148372025-03-07T23:30:37.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 34277157-99ed-4b7f-a69a-baf0ca16c704 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148382025-03-07T23:30:37.626ZINFOtest_unauthorized (external client test context): client received response status = 405
148392025-03-07T23:30:37.626ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools/default/utilization
148402025-03-07T23:30:37.626ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148412025-03-07T23:30:37.626ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 58226e75-d73f-4f28-8fef-c7b970228edc uri = /v1/system/ip-pools/default/utilization
148422025-03-07T23:30:37.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 58226e75-d73f-4f28-8fef-c7b970228edc response_code = 405 uri = /v1/system/ip-pools/default/utilization
148432025-03-07T23:30:37.627ZINFOtest_unauthorized (external client test context): client received response status = 405
148442025-03-07T23:30:37.627ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools/default/utilization
148452025-03-07T23:30:37.627ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148462025-03-07T23:30:37.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e746757d-597a-4d47-92cc-63b2419fea3e uri = /v1/system/ip-pools/default/utilization
148472025-03-07T23:30:37.627ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e746757d-597a-4d47-92cc-63b2419fea3e response_code = 405 uri = /v1/system/ip-pools/default/utilization
148482025-03-07T23:30:37.628ZINFOtest_unauthorized (external client test context): client received response status = 405
148492025-03-07T23:30:37.628ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools/default/utilization
148502025-03-07T23:30:37.628ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148512025-03-07T23:30:37.628ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8f882e1f-6153-44fe-819d-416cbfd9818a uri = /v1/system/ip-pools/default/utilization
148522025-03-07T23:30:37.628ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8f882e1f-6153-44fe-819d-416cbfd9818a response_code = 405 uri = /v1/system/ip-pools/default/utilization
148532025-03-07T23:30:37.628ZINFOtest_unauthorized (external client test context): client received response status = 405
148542025-03-07T23:30:37.628ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools/default/utilization
148552025-03-07T23:30:37.628ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148562025-03-07T23:30:37.628ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 997b3443-790d-408f-800a-eab4787bc264 uri = /v1/system/ip-pools/default/utilization
148572025-03-07T23:30:37.628ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 997b3443-790d-408f-800a-eab4787bc264 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148582025-03-07T23:30:37.629ZINFOtest_unauthorized (external client test context): client received response status = 405
148592025-03-07T23:30:37.629ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools/default/utilization
148602025-03-07T23:30:37.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148612025-03-07T23:30:37.629ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ffd12686-b15f-4e71-b0b7-3dfff91da8fb uri = /v1/system/ip-pools/default/utilization
148622025-03-07T23:30:37.629ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ffd12686-b15f-4e71-b0b7-3dfff91da8fb response_code = 405 uri = /v1/system/ip-pools/default/utilization
148632025-03-07T23:30:37.630ZINFOtest_unauthorized (external client test context): client received response status = 405
148642025-03-07T23:30:37.630ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools/default/utilization
148652025-03-07T23:30:37.630ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148662025-03-07T23:30:37.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 156cde44-cfdf-4ba7-be20-708d59a29902 uri = /v1/system/ip-pools/default/utilization
148672025-03-07T23:30:37.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 156cde44-cfdf-4ba7-be20-708d59a29902 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148682025-03-07T23:30:37.645ZINFOtest_unauthorized (external client test context): client received response status = 405
148692025-03-07T23:30:37.646ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools/default/utilization
148702025-03-07T23:30:37.646ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148712025-03-07T23:30:37.646ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c45b6f5e-6187-49b7-a085-5cdaa31455ab uri = /v1/system/ip-pools/default/utilization
148722025-03-07T23:30:37.646ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 165 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c45b6f5e-6187-49b7-a085-5cdaa31455ab response_code = 405 uri = /v1/system/ip-pools/default/utilization
148732025-03-07T23:30:37.647ZINFOtest_unauthorized (external client test context): client received response status = 405
148742025-03-07T23:30:37.647ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools/default/utilization
148752025-03-07T23:30:37.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148762025-03-07T23:30:37.647ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b89aa7a3-904d-49e1-b166-bd99ff020d46 uri = /v1/system/ip-pools/default/utilization
148772025-03-07T23:30:37.648ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b89aa7a3-904d-49e1-b166-bd99ff020d46 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148782025-03-07T23:30:37.649ZINFOtest_unauthorized (external client test context): client received response status = 405
148792025-03-07T23:30:37.650ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools/default/utilization
148802025-03-07T23:30:37.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148812025-03-07T23:30:37.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 287b6966-e9b2-4a35-9930-163855bfef88 uri = /v1/system/ip-pools/default/utilization
148822025-03-07T23:30:37.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 309 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 287b6966-e9b2-4a35-9930-163855bfef88 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148832025-03-07T23:30:37.651ZINFOtest_unauthorized (external client test context): client received response status = 405
148842025-03-07T23:30:37.652ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools/default/utilization
148852025-03-07T23:30:37.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148862025-03-07T23:30:37.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6615ac73-a051-4cf5-8118-1829d0f33188 uri = /v1/system/ip-pools/default/utilization
148872025-03-07T23:30:37.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6615ac73-a051-4cf5-8118-1829d0f33188 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148882025-03-07T23:30:37.652ZINFOtest_unauthorized (external client test context): client received response status = 405
148892025-03-07T23:30:37.652ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools/default/utilization
148902025-03-07T23:30:37.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148912025-03-07T23:30:37.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cf6107e0-802d-432e-80a1-685eb53cd5fa uri = /v1/system/ip-pools/default/utilization
148922025-03-07T23:30:37.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cf6107e0-802d-432e-80a1-685eb53cd5fa response_code = 405 uri = /v1/system/ip-pools/default/utilization
148932025-03-07T23:30:37.654ZINFOtest_unauthorized (external client test context): client received response status = 405
148942025-03-07T23:30:37.654ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools/default/utilization
148952025-03-07T23:30:37.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
148962025-03-07T23:30:37.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6384e9c6-7efb-49ec-8a3b-c5afb371d375 uri = /v1/system/ip-pools/default/utilization
148972025-03-07T23:30:37.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6384e9c6-7efb-49ec-8a3b-c5afb371d375 response_code = 405 uri = /v1/system/ip-pools/default/utilization
148982025-03-07T23:30:37.656ZINFOtest_unauthorized (external client test context): client received response status = 405
148992025-03-07T23:30:37.656ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools/default/utilization
149002025-03-07T23:30:37.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
149012025-03-07T23:30:37.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ad099711-b6e9-4166-9058-2198441adb96 uri = /v1/system/ip-pools/default/utilization
149022025-03-07T23:30:37.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ad099711-b6e9-4166-9058-2198441adb96 response_code = 405 uri = /v1/system/ip-pools/default/utilization
149032025-03-07T23:30:37.657ZINFOtest_unauthorized (external client test context): client received response status = 405
149042025-03-07T23:30:37.657ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools/default/utilization
149052025-03-07T23:30:37.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools/default/utilization
149062025-03-07T23:30:37.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 uri = /v1/system/ip-pools/default/utilization
149072025-03-07T23:30:37.658ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 uri = /v1/system/ip-pools/default/utilization
149082025-03-07T23:30:37.658ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/utilization
149092025-03-07T23:30:37.658ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149102025-03-07T23:30:37.658ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149112025-03-07T23:30:37.659ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149122025-03-07T23:30:37.677ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149132025-03-07T23:30:37.677ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149142025-03-07T23:30:37.678ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149152025-03-07T23:30:37.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
149162025-03-07T23:30:37.683ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
149172025-03-07T23:30:37.683ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149182025-03-07T23:30:37.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149192025-03-07T23:30:37.684ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149202025-03-07T23:30:37.687ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
149212025-03-07T23:30:37.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149222025-03-07T23:30:37.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149232025-03-07T23:30:37.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149242025-03-07T23:30:37.706ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
149252025-03-07T23:30:37.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
149262025-03-07T23:30:37.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149272025-03-07T23:30:37.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149282025-03-07T23:30:37.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149292025-03-07T23:30:37.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
149302025-03-07T23:30:37.739ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
149312025-03-07T23:30:37.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149322025-03-07T23:30:37.739ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149332025-03-07T23:30:37.740ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149342025-03-07T23:30:37.744ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
149352025-03-07T23:30:37.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149362025-03-07T23:30:37.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149372025-03-07T23:30:37.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149382025-03-07T23:30:37.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
149392025-03-07T23:30:37.757ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
149402025-03-07T23:30:37.757ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 uri = /v1/system/ip-pools/default/utilization
149412025-03-07T23:30:37.757ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149422025-03-07T23:30:37.758ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149432025-03-07T23:30:37.759ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149442025-03-07T23:30:37.773ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
149452025-03-07T23:30:37.773ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
149462025-03-07T23:30:37.773ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149472025-03-07T23:30:37.773ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149482025-03-07T23:30:37.774ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149492025-03-07T23:30:37.780ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
149502025-03-07T23:30:37.787ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149512025-03-07T23:30:37.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
149522025-03-07T23:30:37.787ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
149532025-03-07T23:30:37.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149542025-03-07T23:30:37.787ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149552025-03-07T23:30:37.788ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149562025-03-07T23:30:37.795ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
149572025-03-07T23:30:37.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149582025-03-07T23:30:37.804ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149592025-03-07T23:30:37.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149602025-03-07T23:30:37.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149612025-03-07T23:30:37.806ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
149622025-03-07T23:30:37.806ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
149632025-03-07T23:30:37.806ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
149642025-03-07T23:30:37.806ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
149652025-03-07T23:30:37.822ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
149662025-03-07T23:30:37.822ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
149672025-03-07T23:30:37.822ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149682025-03-07T23:30:37.868ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149692025-03-07T23:30:37.869ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149702025-03-07T23:30:37.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
149712025-03-07T23:30:37.893ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149722025-03-07T23:30:37.893ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/utilization
149732025-03-07T23:30:37.893ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/utilization
149742025-03-07T23:30:37.893ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149752025-03-07T23:30:37.893ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149762025-03-07T23:30:37.894ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149772025-03-07T23:30:37.900ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/utilization
149782025-03-07T23:30:37.911ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = IpPool { parent: Fleet, key: 7bc17b4a-94f3-40f4-a993-a5d9dac4904d, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149792025-03-07T23:30:37.911ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database uri = /v1/system/ip-pools/default/utilization
149802025-03-07T23:30:37.911ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/utilization
149812025-03-07T23:30:37.912ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/utilization
149822025-03-07T23:30:37.947ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 289299 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a1a538e1-2ba6-4381-b9e0-98d2c29061d8 response_code = 200 uri = /v1/system/ip-pools/default/utilization
149832025-03-07T23:30:37.948ZINFOtest_unauthorized (external client test context): client received response status = 200
149842025-03-07T23:30:37.948ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service
149852025-03-07T23:30:37.948ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools-service
149862025-03-07T23:30:37.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service
149872025-03-07T23:30:37.963ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 uri = /v1/system/ip-pools-service
149882025-03-07T23:30:37.963ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 uri = /v1/system/ip-pools-service
149892025-03-07T23:30:37.963ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service
149902025-03-07T23:30:37.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149912025-03-07T23:30:37.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149922025-03-07T23:30:37.964ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149932025-03-07T23:30:37.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149942025-03-07T23:30:37.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
149952025-03-07T23:30:37.968ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
149962025-03-07T23:30:38.004ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
149972025-03-07T23:30:38.004ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
149982025-03-07T23:30:38.004ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
149992025-03-07T23:30:38.004ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150002025-03-07T23:30:38.005ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150012025-03-07T23:30:38.009ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150022025-03-07T23:30:38.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150032025-03-07T23:30:38.009ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150042025-03-07T23:30:38.010ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150052025-03-07T23:30:38.011ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150062025-03-07T23:30:38.022ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
150072025-03-07T23:30:38.022ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150082025-03-07T23:30:38.022ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150092025-03-07T23:30:38.023ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150102025-03-07T23:30:38.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
150112025-03-07T23:30:38.029ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
150122025-03-07T23:30:38.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150132025-03-07T23:30:38.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150142025-03-07T23:30:38.031ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150152025-03-07T23:30:38.035ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150162025-03-07T23:30:38.035ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150172025-03-07T23:30:38.035ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150182025-03-07T23:30:38.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150192025-03-07T23:30:38.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150202025-03-07T23:30:38.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
150212025-03-07T23:30:38.062ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 uri = /v1/system/ip-pools-service
150222025-03-07T23:30:38.062ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = Database uri = /v1/system/ip-pools-service
150232025-03-07T23:30:38.062ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150242025-03-07T23:30:38.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150252025-03-07T23:30:38.069ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
150262025-03-07T23:30:38.069ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
150272025-03-07T23:30:38.070ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = Database uri = /v1/system/ip-pools-service
150282025-03-07T23:30:38.070ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150292025-03-07T23:30:38.071ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150302025-03-07T23:30:38.074ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
150312025-03-07T23:30:38.099ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
150322025-03-07T23:30:38.099ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
150332025-03-07T23:30:38.100ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
150342025-03-07T23:30:38.100ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = Database uri = /v1/system/ip-pools-service
150352025-03-07T23:30:38.100ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150362025-03-07T23:30:38.100ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150372025-03-07T23:30:38.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
150382025-03-07T23:30:38.116ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
150392025-03-07T23:30:38.117ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 154032 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a8826872-a801-465c-ba04-7f92a00a5265 response_code = 200 uri = /v1/system/ip-pools-service
150402025-03-07T23:30:38.117ZINFOtest_unauthorized (external client test context): client received response status = 200
150412025-03-07T23:30:38.117ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service
150422025-03-07T23:30:38.118ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service
150432025-03-07T23:30:38.118ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d uri = /v1/system/ip-pools-service
150442025-03-07T23:30:38.118ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d uri = /v1/system/ip-pools-service
150452025-03-07T23:30:38.118ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service
150462025-03-07T23:30:38.118ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150472025-03-07T23:30:38.118ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150482025-03-07T23:30:38.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150492025-03-07T23:30:38.129ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150502025-03-07T23:30:38.129ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150512025-03-07T23:30:38.130ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150522025-03-07T23:30:38.133ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
150532025-03-07T23:30:38.133ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
150542025-03-07T23:30:38.133ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150552025-03-07T23:30:38.133ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150562025-03-07T23:30:38.134ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150572025-03-07T23:30:38.142ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150582025-03-07T23:30:38.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150592025-03-07T23:30:38.142ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150602025-03-07T23:30:38.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150612025-03-07T23:30:38.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150622025-03-07T23:30:38.174ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
150632025-03-07T23:30:38.174ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150642025-03-07T23:30:38.174ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150652025-03-07T23:30:38.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150662025-03-07T23:30:38.179ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
150672025-03-07T23:30:38.179ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
150682025-03-07T23:30:38.179ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
150692025-03-07T23:30:38.180ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
150702025-03-07T23:30:38.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
150712025-03-07T23:30:38.190ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
150722025-03-07T23:30:38.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150732025-03-07T23:30:38.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150742025-03-07T23:30:38.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150752025-03-07T23:30:38.198ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
150762025-03-07T23:30:38.198ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
150772025-03-07T23:30:38.200ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
150782025-03-07T23:30:38.200ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
150792025-03-07T23:30:38.201ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
150802025-03-07T23:30:38.201ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
150812025-03-07T23:30:38.204ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
150822025-03-07T23:30:38.206ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
150832025-03-07T23:30:38.209ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
150842025-03-07T23:30:38.214ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
150852025-03-07T23:30:38.214ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d uri = /v1/system/ip-pools-service
150862025-03-07T23:30:38.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource = Database uri = /v1/system/ip-pools-service
150872025-03-07T23:30:38.214ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150882025-03-07T23:30:38.215ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150892025-03-07T23:30:38.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
150902025-03-07T23:30:38.217ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
150912025-03-07T23:30:38.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource = Database uri = /v1/system/ip-pools-service
150922025-03-07T23:30:38.217ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150932025-03-07T23:30:38.218ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
150942025-03-07T23:30:38.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
150952025-03-07T23:30:38.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service
150962025-03-07T23:30:38.229ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 111743 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5202e5f4-35b0-406a-80a1-524c4b2e8c0d response_code = 404 uri = /v1/system/ip-pools-service
150972025-03-07T23:30:38.230ZINFOtest_unauthorized (external client test context): client received response status = 404
150982025-03-07T23:30:38.230ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service
150992025-03-07T23:30:38.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151002025-03-07T23:30:38.231ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 uri = /v1/system/ip-pools-service
151012025-03-07T23:30:38.231ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 uri = /v1/system/ip-pools-service
151022025-03-07T23:30:38.231ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 uri = /v1/system/ip-pools-service
151032025-03-07T23:30:38.231ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 uri = /v1/system/ip-pools-service
151042025-03-07T23:30:38.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 resource = Database uri = /v1/system/ip-pools-service
151052025-03-07T23:30:38.231ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
151062025-03-07T23:30:38.231ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service
151072025-03-07T23:30:38.231ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 571 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 071ad83c-2a86-4985-a00b-77c2d63e09e1 response_code = 401 uri = /v1/system/ip-pools-service
151082025-03-07T23:30:38.232ZINFOtest_unauthorized (external client test context): client received response status = 401
151092025-03-07T23:30:38.232ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service
151102025-03-07T23:30:38.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151112025-03-07T23:30:38.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 646529ee-9ec8-4445-b470-bd39a70b08c3 uri = /v1/system/ip-pools-service
151122025-03-07T23:30:38.232ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 646529ee-9ec8-4445-b470-bd39a70b08c3 uri = /v1/system/ip-pools-service
151132025-03-07T23:30:38.232ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 646529ee-9ec8-4445-b470-bd39a70b08c3 uri = /v1/system/ip-pools-service
151142025-03-07T23:30:38.232ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 137 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 646529ee-9ec8-4445-b470-bd39a70b08c3 response_code = 401 uri = /v1/system/ip-pools-service
151152025-03-07T23:30:38.232ZINFOtest_unauthorized (external client test context): client received response status = 401
151162025-03-07T23:30:38.232ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service
151172025-03-07T23:30:38.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151182025-03-07T23:30:38.232ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d10ac0a-c416-4212-9230-670d82c3987f uri = /v1/system/ip-pools-service
151192025-03-07T23:30:38.233ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d10ac0a-c416-4212-9230-670d82c3987f uri = /v1/system/ip-pools-service
151202025-03-07T23:30:38.234ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1352:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1360:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::IpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d10ac0a-c416-4212-9230-670d82c3987f uri = /v1/system/ip-pools-service
151212025-03-07T23:30:38.234ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1267 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d10ac0a-c416-4212-9230-670d82c3987f response_code = 401 uri = /v1/system/ip-pools-service
151222025-03-07T23:30:38.236ZINFOtest_unauthorized (external client test context): client received response status = 401
151232025-03-07T23:30:38.236ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service
151242025-03-07T23:30:38.236ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151252025-03-07T23:30:38.236ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 10d54c44-0108-4c65-9b0e-40e3cf324e84 uri = /v1/system/ip-pools-service
151262025-03-07T23:30:38.236ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 122 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 10d54c44-0108-4c65-9b0e-40e3cf324e84 response_code = 405 uri = /v1/system/ip-pools-service
151272025-03-07T23:30:38.236ZINFOtest_unauthorized (external client test context): client received response status = 405
151282025-03-07T23:30:38.236ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service
151292025-03-07T23:30:38.236ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151302025-03-07T23:30:38.237ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f7450dcd-3bdb-4d56-bab3-b0b06eb2c4df uri = /v1/system/ip-pools-service
151312025-03-07T23:30:38.237ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f7450dcd-3bdb-4d56-bab3-b0b06eb2c4df response_code = 405 uri = /v1/system/ip-pools-service
151322025-03-07T23:30:38.237ZINFOtest_unauthorized (external client test context): client received response status = 405
151332025-03-07T23:30:38.237ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service
151342025-03-07T23:30:38.237ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151352025-03-07T23:30:38.237ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0b4c3b10-8524-4b59-9ab0-c70de3ad4ae4 uri = /v1/system/ip-pools-service
151362025-03-07T23:30:38.237ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0b4c3b10-8524-4b59-9ab0-c70de3ad4ae4 response_code = 405 uri = /v1/system/ip-pools-service
151372025-03-07T23:30:38.237ZINFOtest_unauthorized (external client test context): client received response status = 405
151382025-03-07T23:30:38.237ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service
151392025-03-07T23:30:38.238ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151402025-03-07T23:30:38.238ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5b85f287-efcc-4dcc-bfd3-9b8244bb7dfb uri = /v1/system/ip-pools-service
151412025-03-07T23:30:38.238ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5b85f287-efcc-4dcc-bfd3-9b8244bb7dfb response_code = 405 uri = /v1/system/ip-pools-service
151422025-03-07T23:30:38.238ZINFOtest_unauthorized (external client test context): client received response status = 405
151432025-03-07T23:30:38.238ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service
151442025-03-07T23:30:38.238ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151452025-03-07T23:30:38.238ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3d0262f0-1615-4bbe-8124-9851676360a7 uri = /v1/system/ip-pools-service
151462025-03-07T23:30:38.238ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3d0262f0-1615-4bbe-8124-9851676360a7 response_code = 405 uri = /v1/system/ip-pools-service
151472025-03-07T23:30:38.238ZINFOtest_unauthorized (external client test context): client received response status = 405
151482025-03-07T23:30:38.238ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service
151492025-03-07T23:30:38.239ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151502025-03-07T23:30:38.239ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e7820e90-4a10-4e63-aba6-591c38d49e5b uri = /v1/system/ip-pools-service
151512025-03-07T23:30:38.239ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e7820e90-4a10-4e63-aba6-591c38d49e5b response_code = 405 uri = /v1/system/ip-pools-service
151522025-03-07T23:30:38.239ZINFOtest_unauthorized (external client test context): client received response status = 405
151532025-03-07T23:30:38.239ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service
151542025-03-07T23:30:38.239ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151552025-03-07T23:30:38.239ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a140ab7-4a44-45d4-a6c5-ab066c79a011 uri = /v1/system/ip-pools-service
151562025-03-07T23:30:38.239ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7a140ab7-4a44-45d4-a6c5-ab066c79a011 response_code = 405 uri = /v1/system/ip-pools-service
151572025-03-07T23:30:38.239ZINFOtest_unauthorized (external client test context): client received response status = 405
151582025-03-07T23:30:38.239ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service
151592025-03-07T23:30:38.240ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151602025-03-07T23:30:38.240ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d306d6c-e71b-4c07-92fb-0ea6e6962036 uri = /v1/system/ip-pools-service
151612025-03-07T23:30:38.240ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d306d6c-e71b-4c07-92fb-0ea6e6962036 response_code = 405 uri = /v1/system/ip-pools-service
151622025-03-07T23:30:38.240ZINFOtest_unauthorized (external client test context): client received response status = 405
151632025-03-07T23:30:38.240ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service
151642025-03-07T23:30:38.240ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151652025-03-07T23:30:38.240ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8e2bf03a-8c78-47c4-9edc-f38b5c89ae44 uri = /v1/system/ip-pools-service
151662025-03-07T23:30:38.240ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8e2bf03a-8c78-47c4-9edc-f38b5c89ae44 response_code = 405 uri = /v1/system/ip-pools-service
151672025-03-07T23:30:38.240ZINFOtest_unauthorized (external client test context): client received response status = 405
151682025-03-07T23:30:38.240ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service
151692025-03-07T23:30:38.240ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151702025-03-07T23:30:38.241ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 359613a1-13e2-477f-aa09-1c5210006a24 uri = /v1/system/ip-pools-service
151712025-03-07T23:30:38.241ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 359613a1-13e2-477f-aa09-1c5210006a24 response_code = 405 uri = /v1/system/ip-pools-service
151722025-03-07T23:30:38.241ZINFOtest_unauthorized (external client test context): client received response status = 405
151732025-03-07T23:30:38.241ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service
151742025-03-07T23:30:38.241ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151752025-03-07T23:30:38.241ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 040cbe98-331c-460b-85dc-afe816acc144 uri = /v1/system/ip-pools-service
151762025-03-07T23:30:38.241ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 040cbe98-331c-460b-85dc-afe816acc144 response_code = 405 uri = /v1/system/ip-pools-service
151772025-03-07T23:30:38.241ZINFOtest_unauthorized (external client test context): client received response status = 405
151782025-03-07T23:30:38.241ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service
151792025-03-07T23:30:38.241ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151802025-03-07T23:30:38.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bb6e11f8-25f0-4d0d-8c1e-ab7930ab9493 uri = /v1/system/ip-pools-service
151812025-03-07T23:30:38.242ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bb6e11f8-25f0-4d0d-8c1e-ab7930ab9493 response_code = 405 uri = /v1/system/ip-pools-service
151822025-03-07T23:30:38.242ZINFOtest_unauthorized (external client test context): client received response status = 405
151832025-03-07T23:30:38.242ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service
151842025-03-07T23:30:38.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151852025-03-07T23:30:38.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3d3a1495-0441-4d36-b78d-fbcd8b2f50cc uri = /v1/system/ip-pools-service
151862025-03-07T23:30:38.242ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3d3a1495-0441-4d36-b78d-fbcd8b2f50cc response_code = 405 uri = /v1/system/ip-pools-service
151872025-03-07T23:30:38.242ZINFOtest_unauthorized (external client test context): client received response status = 405
151882025-03-07T23:30:38.242ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service
151892025-03-07T23:30:38.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151902025-03-07T23:30:38.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c2106a72-011b-4514-b546-ac4f9e8b4ec8 uri = /v1/system/ip-pools-service
151912025-03-07T23:30:38.243ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c2106a72-011b-4514-b546-ac4f9e8b4ec8 response_code = 405 uri = /v1/system/ip-pools-service
151922025-03-07T23:30:38.243ZINFOtest_unauthorized (external client test context): client received response status = 405
151932025-03-07T23:30:38.243ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service
151942025-03-07T23:30:38.243ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
151952025-03-07T23:30:38.243ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 85232f0b-37bb-4e9a-a4e1-5f0d9e22c063 uri = /v1/system/ip-pools-service
151962025-03-07T23:30:38.243ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 85232f0b-37bb-4e9a-a4e1-5f0d9e22c063 response_code = 405 uri = /v1/system/ip-pools-service
151972025-03-07T23:30:38.243ZINFOtest_unauthorized (external client test context): client received response status = 405
151982025-03-07T23:30:38.243ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service
151992025-03-07T23:30:38.243ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service
152002025-03-07T23:30:38.243ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 97553104-c2cf-4ba6-b38d-91c75bdaf56d uri = /v1/system/ip-pools-service
152012025-03-07T23:30:38.243ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 97553104-c2cf-4ba6-b38d-91c75bdaf56d response_code = 405 uri = /v1/system/ip-pools-service
152022025-03-07T23:30:38.244ZINFOtest_unauthorized (external client test context): client received response status = 405
152032025-03-07T23:30:38.244ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service
152042025-03-07T23:30:38.244ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service
152052025-03-07T23:30:38.244ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 uri = /v1/system/ip-pools-service
152062025-03-07T23:30:38.244ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 uri = /v1/system/ip-pools-service
152072025-03-07T23:30:38.244ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service
152082025-03-07T23:30:38.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152092025-03-07T23:30:38.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152102025-03-07T23:30:38.245ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152112025-03-07T23:30:38.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152122025-03-07T23:30:38.248ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152132025-03-07T23:30:38.248ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152142025-03-07T23:30:38.251ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
152152025-03-07T23:30:38.251ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
152162025-03-07T23:30:38.251ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152172025-03-07T23:30:38.251ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152182025-03-07T23:30:38.252ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152192025-03-07T23:30:38.255ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
152202025-03-07T23:30:38.255ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152212025-03-07T23:30:38.255ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152222025-03-07T23:30:38.255ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152232025-03-07T23:30:38.257ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
152242025-03-07T23:30:38.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
152252025-03-07T23:30:38.264ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152262025-03-07T23:30:38.264ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152272025-03-07T23:30:38.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152282025-03-07T23:30:38.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
152292025-03-07T23:30:38.269ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
152302025-03-07T23:30:38.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152312025-03-07T23:30:38.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152322025-03-07T23:30:38.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152332025-03-07T23:30:38.276ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
152342025-03-07T23:30:38.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152352025-03-07T23:30:38.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152362025-03-07T23:30:38.277ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152372025-03-07T23:30:38.289ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
152382025-03-07T23:30:38.317ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
152392025-03-07T23:30:38.324ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
152402025-03-07T23:30:38.324ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 uri = /v1/system/ip-pools-service
152412025-03-07T23:30:38.324ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = Database uri = /v1/system/ip-pools-service
152422025-03-07T23:30:38.324ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
152432025-03-07T23:30:38.325ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
152442025-03-07T23:30:38.343ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
152452025-03-07T23:30:38.344ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
152462025-03-07T23:30:38.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = Database uri = /v1/system/ip-pools-service
152472025-03-07T23:30:38.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
152482025-03-07T23:30:38.345ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
152492025-03-07T23:30:38.349ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
152502025-03-07T23:30:38.357ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
152512025-03-07T23:30:38.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service
152522025-03-07T23:30:38.358ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service
152532025-03-07T23:30:38.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = Database uri = /v1/system/ip-pools-service
152542025-03-07T23:30:38.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service
152552025-03-07T23:30:38.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service
152562025-03-07T23:30:38.367ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service
152572025-03-07T23:30:38.374ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service
152582025-03-07T23:30:38.374ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 129760 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c08f95b7-e419-42f7-942e-f210dea264e0 response_code = 200 uri = /v1/system/ip-pools-service
152592025-03-07T23:30:38.374ZINFOtest_unauthorized (external client test context): client received response status = 200
152602025-03-07T23:30:38.375ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service/ranges
152612025-03-07T23:30:38.375ZINFOtest_unauthorized: test: privileged GET url = /v1/system/ip-pools-service/ranges
152622025-03-07T23:30:38.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
152632025-03-07T23:30:38.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b uri = /v1/system/ip-pools-service/ranges
152642025-03-07T23:30:38.375ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b uri = /v1/system/ip-pools-service/ranges
152652025-03-07T23:30:38.375ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service/ranges
152662025-03-07T23:30:38.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152672025-03-07T23:30:38.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152682025-03-07T23:30:38.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152692025-03-07T23:30:38.378ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152702025-03-07T23:30:38.378ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152712025-03-07T23:30:38.379ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152722025-03-07T23:30:38.385ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
152732025-03-07T23:30:38.385ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
152742025-03-07T23:30:38.385ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152752025-03-07T23:30:38.385ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152762025-03-07T23:30:38.386ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152772025-03-07T23:30:38.389ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
152782025-03-07T23:30:38.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152792025-03-07T23:30:38.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152802025-03-07T23:30:38.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152812025-03-07T23:30:38.420ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
152822025-03-07T23:30:38.425ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
152832025-03-07T23:30:38.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152842025-03-07T23:30:38.426ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152852025-03-07T23:30:38.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152862025-03-07T23:30:38.432ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
152872025-03-07T23:30:38.432ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
152882025-03-07T23:30:38.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152892025-03-07T23:30:38.433ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152902025-03-07T23:30:38.433ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152912025-03-07T23:30:38.441ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
152922025-03-07T23:30:38.441ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
152932025-03-07T23:30:38.441ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
152942025-03-07T23:30:38.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
152952025-03-07T23:30:38.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
152962025-03-07T23:30:38.462ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
152972025-03-07T23:30:38.462ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b uri = /v1/system/ip-pools-service/ranges
152982025-03-07T23:30:38.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database uri = /v1/system/ip-pools-service/ranges
152992025-03-07T23:30:38.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153002025-03-07T23:30:38.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153012025-03-07T23:30:38.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153022025-03-07T23:30:38.505ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153032025-03-07T23:30:38.505ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database uri = /v1/system/ip-pools-service/ranges
153042025-03-07T23:30:38.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153052025-03-07T23:30:38.506ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153062025-03-07T23:30:38.510ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
153072025-03-07T23:30:38.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153082025-03-07T23:30:38.518ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153092025-03-07T23:30:38.518ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153102025-03-07T23:30:38.518ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database uri = /v1/system/ip-pools-service/ranges
153112025-03-07T23:30:38.518ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153122025-03-07T23:30:38.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153132025-03-07T23:30:38.525ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
153142025-03-07T23:30:38.531ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153152025-03-07T23:30:38.531ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153162025-03-07T23:30:38.531ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153172025-03-07T23:30:38.531ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database uri = /v1/system/ip-pools-service/ranges
153182025-03-07T23:30:38.531ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153192025-03-07T23:30:38.531ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153202025-03-07T23:30:38.535ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
153212025-03-07T23:30:38.541ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153222025-03-07T23:30:38.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database uri = /v1/system/ip-pools-service/ranges
153232025-03-07T23:30:38.541ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153242025-03-07T23:30:38.542ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153252025-03-07T23:30:38.546ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 170671 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 40c038c8-9c98-4d1f-b265-a2dabe88ba1b response_code = 200 uri = /v1/system/ip-pools-service/ranges
153262025-03-07T23:30:38.548ZINFOtest_unauthorized (external client test context): client received response status = 200
153272025-03-07T23:30:38.548ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service/ranges
153282025-03-07T23:30:38.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
153292025-03-07T23:30:38.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a uri = /v1/system/ip-pools-service/ranges
153302025-03-07T23:30:38.548ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a uri = /v1/system/ip-pools-service/ranges
153312025-03-07T23:30:38.548ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service/ranges
153322025-03-07T23:30:38.548ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153332025-03-07T23:30:38.549ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153342025-03-07T23:30:38.549ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153352025-03-07T23:30:38.553ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153362025-03-07T23:30:38.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153372025-03-07T23:30:38.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153382025-03-07T23:30:38.563ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
153392025-03-07T23:30:38.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
153402025-03-07T23:30:38.564ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
153412025-03-07T23:30:38.564ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
153422025-03-07T23:30:38.564ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153432025-03-07T23:30:38.564ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153442025-03-07T23:30:38.565ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153452025-03-07T23:30:38.566ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
153462025-03-07T23:30:38.566ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
153472025-03-07T23:30:38.566ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
153482025-03-07T23:30:38.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
153492025-03-07T23:30:38.593ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
153502025-03-07T23:30:38.600ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153512025-03-07T23:30:38.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153522025-03-07T23:30:38.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153532025-03-07T23:30:38.611ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
153542025-03-07T23:30:38.617ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
153552025-03-07T23:30:38.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153562025-03-07T23:30:38.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153572025-03-07T23:30:38.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153582025-03-07T23:30:38.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
153592025-03-07T23:30:38.623ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
153602025-03-07T23:30:38.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153612025-03-07T23:30:38.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153622025-03-07T23:30:38.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153632025-03-07T23:30:38.642ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
153642025-03-07T23:30:38.642ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
153652025-03-07T23:30:38.642ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
153662025-03-07T23:30:38.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
153672025-03-07T23:30:38.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
153682025-03-07T23:30:38.654ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
153692025-03-07T23:30:38.656ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a uri = /v1/system/ip-pools-service/ranges
153702025-03-07T23:30:38.656ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource = Database uri = /v1/system/ip-pools-service/ranges
153712025-03-07T23:30:38.656ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153722025-03-07T23:30:38.656ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153732025-03-07T23:30:38.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
153742025-03-07T23:30:38.659ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
153752025-03-07T23:30:38.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource = Database uri = /v1/system/ip-pools-service/ranges
153762025-03-07T23:30:38.659ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153772025-03-07T23:30:38.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
153782025-03-07T23:30:38.663ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153792025-03-07T23:30:38.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service/ranges
153802025-03-07T23:30:38.672ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 124059 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5323c0d5-4994-42d6-9c0f-58baceb85a2a response_code = 404 uri = /v1/system/ip-pools-service/ranges
153812025-03-07T23:30:38.673ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
153822025-03-07T23:30:38.673ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
153832025-03-07T23:30:38.673ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
153842025-03-07T23:30:38.674ZINFOtest_unauthorized (external client test context): client received response status = 404
153852025-03-07T23:30:38.674ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service/ranges
153862025-03-07T23:30:38.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
153872025-03-07T23:30:38.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 uri = /v1/system/ip-pools-service/ranges
153882025-03-07T23:30:38.674ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 uri = /v1/system/ip-pools-service/ranges
153892025-03-07T23:30:38.674ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 uri = /v1/system/ip-pools-service/ranges
153902025-03-07T23:30:38.674ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 uri = /v1/system/ip-pools-service/ranges
153912025-03-07T23:30:38.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 resource = Database uri = /v1/system/ip-pools-service/ranges
153922025-03-07T23:30:38.675ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
153932025-03-07T23:30:38.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service/ranges
153942025-03-07T23:30:38.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 648 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c4b77f0-f5e0-4bd3-97f8-bac271a5f1f3 response_code = 401 uri = /v1/system/ip-pools-service/ranges
153952025-03-07T23:30:38.675ZINFOtest_unauthorized (external client test context): client received response status = 401
153962025-03-07T23:30:38.675ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service/ranges
153972025-03-07T23:30:38.675ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
153982025-03-07T23:30:38.675ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2af3c425-48fb-490a-89c0-c23fed8c2206 uri = /v1/system/ip-pools-service/ranges
153992025-03-07T23:30:38.675ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2af3c425-48fb-490a-89c0-c23fed8c2206 uri = /v1/system/ip-pools-service/ranges
154002025-03-07T23:30:38.675ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2af3c425-48fb-490a-89c0-c23fed8c2206 uri = /v1/system/ip-pools-service/ranges
154012025-03-07T23:30:38.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 170 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2af3c425-48fb-490a-89c0-c23fed8c2206 response_code = 401 uri = /v1/system/ip-pools-service/ranges
154022025-03-07T23:30:38.676ZINFOtest_unauthorized (external client test context): client received response status = 401
154032025-03-07T23:30:38.676ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service/ranges
154042025-03-07T23:30:38.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154052025-03-07T23:30:38.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 47cdad4d-8d5b-4d4e-8af9-79a1a66a843b uri = /v1/system/ip-pools-service/ranges
154062025-03-07T23:30:38.676ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 47cdad4d-8d5b-4d4e-8af9-79a1a66a843b uri = /v1/system/ip-pools-service/ranges
154072025-03-07T23:30:38.678ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1460:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1490:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<dropshot::pagination::EmptyScanParams, ipnetwork::IpNetwork>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::IpPoolRange>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 47cdad4d-8d5b-4d4e-8af9-79a1a66a843b uri = /v1/system/ip-pools-service/ranges
154082025-03-07T23:30:38.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1216 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 47cdad4d-8d5b-4d4e-8af9-79a1a66a843b response_code = 401 uri = /v1/system/ip-pools-service/ranges
154092025-03-07T23:30:38.678ZINFOtest_unauthorized (external client test context): client received response status = 401
154102025-03-07T23:30:38.678ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service/ranges
154112025-03-07T23:30:38.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154122025-03-07T23:30:38.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 07a0b281-a643-4adf-837f-5a8991dc0f46 uri = /v1/system/ip-pools-service/ranges
154132025-03-07T23:30:38.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 07a0b281-a643-4adf-837f-5a8991dc0f46 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154142025-03-07T23:30:38.678ZINFOtest_unauthorized (external client test context): client received response status = 405
154152025-03-07T23:30:38.678ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service/ranges
154162025-03-07T23:30:38.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154172025-03-07T23:30:38.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dc932d44-77f0-4621-acf6-2d3f4bcefe64 uri = /v1/system/ip-pools-service/ranges
154182025-03-07T23:30:38.679ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dc932d44-77f0-4621-acf6-2d3f4bcefe64 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154192025-03-07T23:30:38.679ZINFOtest_unauthorized (external client test context): client received response status = 405
154202025-03-07T23:30:38.679ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service/ranges
154212025-03-07T23:30:38.679ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154222025-03-07T23:30:38.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 49d037de-0884-4de8-8673-edbdc11a0881 uri = /v1/system/ip-pools-service/ranges
154232025-03-07T23:30:38.679ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 49d037de-0884-4de8-8673-edbdc11a0881 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154242025-03-07T23:30:38.679ZINFOtest_unauthorized (external client test context): client received response status = 405
154252025-03-07T23:30:38.679ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service/ranges
154262025-03-07T23:30:38.679ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154272025-03-07T23:30:38.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 166eb265-19e1-436d-bade-0ef5a3be18b0 uri = /v1/system/ip-pools-service/ranges
154282025-03-07T23:30:38.679ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 99 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 166eb265-19e1-436d-bade-0ef5a3be18b0 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154292025-03-07T23:30:38.680ZINFOtest_unauthorized (external client test context): client received response status = 405
154302025-03-07T23:30:38.680ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service/ranges
154312025-03-07T23:30:38.680ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154322025-03-07T23:30:38.680ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 15adabfd-4489-4c83-9a1b-4a2b2515f310 uri = /v1/system/ip-pools-service/ranges
154332025-03-07T23:30:38.680ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 15adabfd-4489-4c83-9a1b-4a2b2515f310 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154342025-03-07T23:30:38.680ZINFOtest_unauthorized (external client test context): client received response status = 405
154352025-03-07T23:30:38.680ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service/ranges
154362025-03-07T23:30:38.680ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154372025-03-07T23:30:38.681ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ca4db648-900d-45b0-80e1-ed67d49fdecb uri = /v1/system/ip-pools-service/ranges
154382025-03-07T23:30:38.681ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ca4db648-900d-45b0-80e1-ed67d49fdecb response_code = 405 uri = /v1/system/ip-pools-service/ranges
154392025-03-07T23:30:38.681ZINFOtest_unauthorized (external client test context): client received response status = 405
154402025-03-07T23:30:38.681ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service/ranges
154412025-03-07T23:30:38.681ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154422025-03-07T23:30:38.681ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132cd837-f98c-4e00-b766-5fff6f84c698 uri = /v1/system/ip-pools-service/ranges
154432025-03-07T23:30:38.681ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 132cd837-f98c-4e00-b766-5fff6f84c698 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154442025-03-07T23:30:38.681ZINFOtest_unauthorized (external client test context): client received response status = 405
154452025-03-07T23:30:38.681ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service/ranges
154462025-03-07T23:30:38.681ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154472025-03-07T23:30:38.682ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1624d2e6-82ba-4623-98d2-8000acc5c766 uri = /v1/system/ip-pools-service/ranges
154482025-03-07T23:30:38.682ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1624d2e6-82ba-4623-98d2-8000acc5c766 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154492025-03-07T23:30:38.682ZINFOtest_unauthorized (external client test context): client received response status = 405
154502025-03-07T23:30:38.682ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service/ranges
154512025-03-07T23:30:38.682ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154522025-03-07T23:30:38.682ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cec9c496-1cb6-44e0-8089-487ead5926ce uri = /v1/system/ip-pools-service/ranges
154532025-03-07T23:30:38.682ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cec9c496-1cb6-44e0-8089-487ead5926ce response_code = 405 uri = /v1/system/ip-pools-service/ranges
154542025-03-07T23:30:38.683ZINFOtest_unauthorized (external client test context): client received response status = 405
154552025-03-07T23:30:38.683ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service/ranges
154562025-03-07T23:30:38.683ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154572025-03-07T23:30:38.683ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = efe8434d-2962-4b13-bce7-5001d7872d41 uri = /v1/system/ip-pools-service/ranges
154582025-03-07T23:30:38.683ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = efe8434d-2962-4b13-bce7-5001d7872d41 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154592025-03-07T23:30:38.683ZINFOtest_unauthorized (external client test context): client received response status = 405
154602025-03-07T23:30:38.683ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service/ranges
154612025-03-07T23:30:38.683ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154622025-03-07T23:30:38.683ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9c4bfafb-4876-4ad2-967c-61680a68793c uri = /v1/system/ip-pools-service/ranges
154632025-03-07T23:30:38.683ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9c4bfafb-4876-4ad2-967c-61680a68793c response_code = 405 uri = /v1/system/ip-pools-service/ranges
154642025-03-07T23:30:38.683ZINFOtest_unauthorized (external client test context): client received response status = 405
154652025-03-07T23:30:38.684ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service/ranges
154662025-03-07T23:30:38.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154672025-03-07T23:30:38.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = aaec7233-daf4-433d-b685-8a6508576423 uri = /v1/system/ip-pools-service/ranges
154682025-03-07T23:30:38.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = aaec7233-daf4-433d-b685-8a6508576423 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154692025-03-07T23:30:38.689ZINFOtest_unauthorized (external client test context): client received response status = 405
154702025-03-07T23:30:38.689ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service/ranges
154712025-03-07T23:30:38.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154722025-03-07T23:30:38.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70d16e74-6e02-4f05-a83d-b7e82ba78ba7 uri = /v1/system/ip-pools-service/ranges
154732025-03-07T23:30:38.690ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 300 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70d16e74-6e02-4f05-a83d-b7e82ba78ba7 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154742025-03-07T23:30:38.690ZINFOtest_unauthorized (external client test context): client received response status = 405
154752025-03-07T23:30:38.690ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service/ranges
154762025-03-07T23:30:38.690ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154772025-03-07T23:30:38.691ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4de66657-f517-42e6-b262-765fc226bff5 uri = /v1/system/ip-pools-service/ranges
154782025-03-07T23:30:38.691ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 164 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4de66657-f517-42e6-b262-765fc226bff5 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154792025-03-07T23:30:38.691ZINFOtest_unauthorized (external client test context): client received response status = 405
154802025-03-07T23:30:38.691ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service/ranges
154812025-03-07T23:30:38.691ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154822025-03-07T23:30:38.692ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 955fe6ff-b000-478f-bf6d-74ccc01d9b37 uri = /v1/system/ip-pools-service/ranges
154832025-03-07T23:30:38.692ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 955fe6ff-b000-478f-bf6d-74ccc01d9b37 response_code = 405 uri = /v1/system/ip-pools-service/ranges
154842025-03-07T23:30:38.692ZINFOtest_unauthorized (external client test context): client received response status = 405
154852025-03-07T23:30:38.692ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service/ranges
154862025-03-07T23:30:38.692ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154872025-03-07T23:30:38.692ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b97c1449-ab7f-4290-8d01-7f20cd0729ea uri = /v1/system/ip-pools-service/ranges
154882025-03-07T23:30:38.693ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b97c1449-ab7f-4290-8d01-7f20cd0729ea response_code = 405 uri = /v1/system/ip-pools-service/ranges
154892025-03-07T23:30:38.693ZINFOtest_unauthorized (external client test context): client received response status = 405
154902025-03-07T23:30:38.693ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service/ranges
154912025-03-07T23:30:38.693ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges
154922025-03-07T23:30:38.693ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 uri = /v1/system/ip-pools-service/ranges
154932025-03-07T23:30:38.694ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 uri = /v1/system/ip-pools-service/ranges
154942025-03-07T23:30:38.694ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools-service/ranges
154952025-03-07T23:30:38.694ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154962025-03-07T23:30:38.694ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
154972025-03-07T23:30:38.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
154982025-03-07T23:30:38.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
154992025-03-07T23:30:38.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155002025-03-07T23:30:38.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155012025-03-07T23:30:38.712ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
155022025-03-07T23:30:38.712ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
155032025-03-07T23:30:38.712ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155042025-03-07T23:30:38.712ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155052025-03-07T23:30:38.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155062025-03-07T23:30:38.720ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
155072025-03-07T23:30:38.720ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155082025-03-07T23:30:38.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155092025-03-07T23:30:38.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155102025-03-07T23:30:38.722ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
155112025-03-07T23:30:38.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
155122025-03-07T23:30:38.728ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155132025-03-07T23:30:38.728ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155142025-03-07T23:30:38.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155152025-03-07T23:30:38.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
155162025-03-07T23:30:38.731ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
155172025-03-07T23:30:38.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155182025-03-07T23:30:38.731ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155192025-03-07T23:30:38.732ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155202025-03-07T23:30:38.735ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
155212025-03-07T23:30:38.735ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
155222025-03-07T23:30:38.735ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
155232025-03-07T23:30:38.736ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
155242025-03-07T23:30:38.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
155252025-03-07T23:30:38.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
155262025-03-07T23:30:38.744ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 uri = /v1/system/ip-pools-service/ranges
155272025-03-07T23:30:38.744ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database uri = /v1/system/ip-pools-service/ranges
155282025-03-07T23:30:38.745ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
155292025-03-07T23:30:38.745ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155302025-03-07T23:30:38.749ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
155312025-03-07T23:30:38.749ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
155322025-03-07T23:30:38.749ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database uri = /v1/system/ip-pools-service/ranges
155332025-03-07T23:30:38.750ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
155342025-03-07T23:30:38.750ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155352025-03-07T23:30:38.765ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
155362025-03-07T23:30:38.773ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155372025-03-07T23:30:38.773ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
155382025-03-07T23:30:38.773ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
155392025-03-07T23:30:38.773ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database uri = /v1/system/ip-pools-service/ranges
155402025-03-07T23:30:38.773ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
155412025-03-07T23:30:38.774ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155422025-03-07T23:30:38.780ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
155432025-03-07T23:30:38.789ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155442025-03-07T23:30:38.789ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges
155452025-03-07T23:30:38.789ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges
155462025-03-07T23:30:38.789ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database uri = /v1/system/ip-pools-service/ranges
155472025-03-07T23:30:38.789ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
155482025-03-07T23:30:38.790ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155492025-03-07T23:30:38.794ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools-service/ranges
155502025-03-07T23:30:38.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155512025-03-07T23:30:38.801ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database uri = /v1/system/ip-pools-service/ranges
155522025-03-07T23:30:38.802ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges
155532025-03-07T23:30:38.802ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges
155542025-03-07T23:30:38.814ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 120845 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 546212e2-793d-4e9a-af9d-fe94c26812f9 response_code = 200 uri = /v1/system/ip-pools-service/ranges
155552025-03-07T23:30:38.815ZINFOtest_unauthorized (external client test context): client received response status = 200
155562025-03-07T23:30:38.815ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service/ranges/add
155572025-03-07T23:30:38.815ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools-service/ranges/add
155582025-03-07T23:30:38.815ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service/ranges/add
155592025-03-07T23:30:38.815ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155602025-03-07T23:30:38.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8b58179d-3faa-4e5f-98c0-b4c590442e39 uri = /v1/system/ip-pools-service/ranges/add
155612025-03-07T23:30:38.818ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 121 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8b58179d-3faa-4e5f-98c0-b4c590442e39 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155622025-03-07T23:30:38.820ZINFOtest_unauthorized (external client test context): client received response status = 405
155632025-03-07T23:30:38.821ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service/ranges/add
155642025-03-07T23:30:38.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155652025-03-07T23:30:38.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 362c6b4e-6925-4248-a820-7d5f2e201516 uri = /v1/system/ip-pools-service/ranges/add
155662025-03-07T23:30:38.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 405 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 362c6b4e-6925-4248-a820-7d5f2e201516 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155672025-03-07T23:30:38.834ZINFOtest_unauthorized (external client test context): client received response status = 405
155682025-03-07T23:30:38.834ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service/ranges/add
155692025-03-07T23:30:38.834ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155702025-03-07T23:30:38.835ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 78a9561b-5dfa-4474-9262-a29a2cea24b0 uri = /v1/system/ip-pools-service/ranges/add
155712025-03-07T23:30:38.835ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 213 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 78a9561b-5dfa-4474-9262-a29a2cea24b0 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155722025-03-07T23:30:38.836ZINFOtest_unauthorized (external client test context): client received response status = 405
155732025-03-07T23:30:38.836ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service/ranges/add
155742025-03-07T23:30:38.836ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155752025-03-07T23:30:38.836ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 38fefdf9-0424-4058-80ee-03aab9850f35 uri = /v1/system/ip-pools-service/ranges/add
155762025-03-07T23:30:38.836ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 38fefdf9-0424-4058-80ee-03aab9850f35 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155772025-03-07T23:30:38.837ZINFOtest_unauthorized (external client test context): client received response status = 405
155782025-03-07T23:30:38.837ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service/ranges/add
155792025-03-07T23:30:38.837ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155802025-03-07T23:30:38.837ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b5cac6a4-9b69-4368-bf4a-bef1c5bc8f48 uri = /v1/system/ip-pools-service/ranges/add
155812025-03-07T23:30:38.837ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b5cac6a4-9b69-4368-bf4a-bef1c5bc8f48 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155822025-03-07T23:30:38.837ZINFOtest_unauthorized (external client test context): client received response status = 405
155832025-03-07T23:30:38.837ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service/ranges/add
155842025-03-07T23:30:38.837ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155852025-03-07T23:30:38.837ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 22e9f1ad-1c1a-4f82-a2fa-74af80813e0f uri = /v1/system/ip-pools-service/ranges/add
155862025-03-07T23:30:38.838ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 22e9f1ad-1c1a-4f82-a2fa-74af80813e0f response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155872025-03-07T23:30:38.838ZINFOtest_unauthorized (external client test context): client received response status = 405
155882025-03-07T23:30:38.838ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service/ranges/add
155892025-03-07T23:30:38.838ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155902025-03-07T23:30:38.838ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 796b5daa-8931-47ba-ba95-ece9abf9a2a2 uri = /v1/system/ip-pools-service/ranges/add
155912025-03-07T23:30:38.838ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 796b5daa-8931-47ba-ba95-ece9abf9a2a2 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155922025-03-07T23:30:38.839ZINFOtest_unauthorized (external client test context): client received response status = 405
155932025-03-07T23:30:38.839ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service/ranges/add
155942025-03-07T23:30:38.839ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
155952025-03-07T23:30:38.839ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a5fa1d85-f763-4a76-ac05-ff2e809c46a3 uri = /v1/system/ip-pools-service/ranges/add
155962025-03-07T23:30:38.839ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a5fa1d85-f763-4a76-ac05-ff2e809c46a3 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
155972025-03-07T23:30:38.839ZINFOtest_unauthorized (external client test context): client received response status = 405
155982025-03-07T23:30:38.839ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service/ranges/add
155992025-03-07T23:30:38.839ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156002025-03-07T23:30:38.840ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f uri = /v1/system/ip-pools-service/ranges/add
156012025-03-07T23:30:38.840ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f uri = /v1/system/ip-pools-service/ranges/add
156022025-03-07T23:30:38.840ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service/ranges/add
156032025-03-07T23:30:38.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156042025-03-07T23:30:38.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156052025-03-07T23:30:38.841ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156062025-03-07T23:30:38.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156072025-03-07T23:30:38.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156082025-03-07T23:30:38.846ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156092025-03-07T23:30:38.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
156102025-03-07T23:30:38.848ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
156112025-03-07T23:30:38.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156122025-03-07T23:30:38.849ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156132025-03-07T23:30:38.850ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156142025-03-07T23:30:38.863ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
156152025-03-07T23:30:38.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156162025-03-07T23:30:38.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156172025-03-07T23:30:38.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156182025-03-07T23:30:38.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
156192025-03-07T23:30:38.869ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
156202025-03-07T23:30:38.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156212025-03-07T23:30:38.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156222025-03-07T23:30:38.870ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156232025-03-07T23:30:38.875ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
156242025-03-07T23:30:38.876ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
156252025-03-07T23:30:38.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156262025-03-07T23:30:38.876ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156272025-03-07T23:30:38.877ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156282025-03-07T23:30:38.881ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
156292025-03-07T23:30:38.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
156302025-03-07T23:30:38.881ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
156312025-03-07T23:30:38.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
156322025-03-07T23:30:38.895ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
156332025-03-07T23:30:38.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
156342025-03-07T23:30:38.903ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f uri = /v1/system/ip-pools-service/ranges/add
156352025-03-07T23:30:38.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource = Database uri = /v1/system/ip-pools-service/ranges/add
156362025-03-07T23:30:38.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
156372025-03-07T23:30:38.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/add
156382025-03-07T23:30:38.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges/add
156392025-03-07T23:30:38.907ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges/add
156402025-03-07T23:30:38.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource = Database uri = /v1/system/ip-pools-service/ranges/add
156412025-03-07T23:30:38.907ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
156422025-03-07T23:30:38.907ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/add
156432025-03-07T23:30:38.912ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
156442025-03-07T23:30:38.919ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service/ranges/add
156452025-03-07T23:30:38.920ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 80131 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 29602c09-4812-4af1-beba-5d1b82f2390f response_code = 404 uri = /v1/system/ip-pools-service/ranges/add
156462025-03-07T23:30:38.921ZINFOtest_unauthorized (external client test context): client received response status = 404
156472025-03-07T23:30:38.921ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service/ranges/add
156482025-03-07T23:30:38.922ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156492025-03-07T23:30:38.922ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab uri = /v1/system/ip-pools-service/ranges/add
156502025-03-07T23:30:38.922ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab uri = /v1/system/ip-pools-service/ranges/add
156512025-03-07T23:30:38.922ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab uri = /v1/system/ip-pools-service/ranges/add
156522025-03-07T23:30:38.922ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab uri = /v1/system/ip-pools-service/ranges/add
156532025-03-07T23:30:38.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab resource = Database uri = /v1/system/ip-pools-service/ranges/add
156542025-03-07T23:30:38.923ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/add
156552025-03-07T23:30:38.923ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service/ranges/add
156562025-03-07T23:30:38.923ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 897 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4b0c7cd3-c554-4583-8060-af1bd7c98bab response_code = 401 uri = /v1/system/ip-pools-service/ranges/add
156572025-03-07T23:30:38.923ZINFOtest_unauthorized (external client test context): client received response status = 401
156582025-03-07T23:30:38.923ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service/ranges/add
156592025-03-07T23:30:38.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156602025-03-07T23:30:38.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2bba6378-a0ef-4793-8c46-46fc0e18e956 uri = /v1/system/ip-pools-service/ranges/add
156612025-03-07T23:30:38.924ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2bba6378-a0ef-4793-8c46-46fc0e18e956 uri = /v1/system/ip-pools-service/ranges/add
156622025-03-07T23:30:38.924ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2bba6378-a0ef-4793-8c46-46fc0e18e956 uri = /v1/system/ip-pools-service/ranges/add
156632025-03-07T23:30:38.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 238 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2bba6378-a0ef-4793-8c46-46fc0e18e956 response_code = 401 uri = /v1/system/ip-pools-service/ranges/add
156642025-03-07T23:30:38.924ZINFOtest_unauthorized (external client test context): client received response status = 401
156652025-03-07T23:30:38.925ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service/ranges/add
156662025-03-07T23:30:38.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156672025-03-07T23:30:38.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ea9a20c1-57c9-4348-97dd-52048cc33b64 uri = /v1/system/ip-pools-service/ranges/add
156682025-03-07T23:30:38.925ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ea9a20c1-57c9-4348-97dd-52048cc33b64 uri = /v1/system/ip-pools-service/ranges/add
156692025-03-07T23:30:38.927ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1500:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1510:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_add::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::IpPoolRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ea9a20c1-57c9-4348-97dd-52048cc33b64 uri = /v1/system/ip-pools-service/ranges/add
156702025-03-07T23:30:38.927ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1838 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ea9a20c1-57c9-4348-97dd-52048cc33b64 response_code = 401 uri = /v1/system/ip-pools-service/ranges/add
156712025-03-07T23:30:38.927ZINFOtest_unauthorized (external client test context): client received response status = 401
156722025-03-07T23:30:38.927ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service/ranges/add
156732025-03-07T23:30:38.927ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156742025-03-07T23:30:38.927ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3b9dbc9e-fe69-48bc-8edd-039476945790 uri = /v1/system/ip-pools-service/ranges/add
156752025-03-07T23:30:38.928ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3b9dbc9e-fe69-48bc-8edd-039476945790 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
156762025-03-07T23:30:38.928ZINFOtest_unauthorized (external client test context): client received response status = 405
156772025-03-07T23:30:38.928ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service/ranges/add
156782025-03-07T23:30:38.928ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156792025-03-07T23:30:38.928ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 096f66d2-bb80-45c9-b2cf-6ed3b6d0882a uri = /v1/system/ip-pools-service/ranges/add
156802025-03-07T23:30:38.928ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 096f66d2-bb80-45c9-b2cf-6ed3b6d0882a response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
156812025-03-07T23:30:38.929ZINFOtest_unauthorized (external client test context): client received response status = 405
156822025-03-07T23:30:38.929ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service/ranges/add
156832025-03-07T23:30:38.929ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156842025-03-07T23:30:38.929ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36766916-781c-4801-b33f-81fe56f5e201 uri = /v1/system/ip-pools-service/ranges/add
156852025-03-07T23:30:38.929ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 322 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36766916-781c-4801-b33f-81fe56f5e201 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
156862025-03-07T23:30:38.930ZINFOtest_unauthorized (external client test context): client received response status = 405
156872025-03-07T23:30:38.930ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service/ranges/add
156882025-03-07T23:30:38.930ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156892025-03-07T23:30:38.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = aaf1b7f8-6a77-4525-a0e8-2e9104978990 uri = /v1/system/ip-pools-service/ranges/add
156902025-03-07T23:30:38.930ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = aaf1b7f8-6a77-4525-a0e8-2e9104978990 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
156912025-03-07T23:30:38.930ZINFOtest_unauthorized (external client test context): client received response status = 405
156922025-03-07T23:30:38.930ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service/ranges/add
156932025-03-07T23:30:38.930ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156942025-03-07T23:30:38.930ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2032f37b-3be5-4fc2-aac4-1980061baf1c uri = /v1/system/ip-pools-service/ranges/add
156952025-03-07T23:30:38.930ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2032f37b-3be5-4fc2-aac4-1980061baf1c response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
156962025-03-07T23:30:38.931ZINFOtest_unauthorized (external client test context): client received response status = 405
156972025-03-07T23:30:38.931ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service/ranges/add
156982025-03-07T23:30:38.931ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
156992025-03-07T23:30:38.931ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f644a192-b723-4126-8fac-e7491fbbbe46 uri = /v1/system/ip-pools-service/ranges/add
157002025-03-07T23:30:38.931ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f644a192-b723-4126-8fac-e7491fbbbe46 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
157012025-03-07T23:30:38.931ZINFOtest_unauthorized (external client test context): client received response status = 405
157022025-03-07T23:30:38.931ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service/ranges/add
157032025-03-07T23:30:38.931ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
157042025-03-07T23:30:38.932ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dd81a8ce-eb34-41be-b227-80e29b9008bd uri = /v1/system/ip-pools-service/ranges/add
157052025-03-07T23:30:38.932ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dd81a8ce-eb34-41be-b227-80e29b9008bd response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
157062025-03-07T23:30:38.932ZINFOtest_unauthorized (external client test context): client received response status = 405
157072025-03-07T23:30:38.932ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service/ranges/add
157082025-03-07T23:30:38.932ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/add
157092025-03-07T23:30:38.932ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 82931e70-60da-413e-b041-27503c302472 uri = /v1/system/ip-pools-service/ranges/add
157102025-03-07T23:30:38.932ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 82931e70-60da-413e-b041-27503c302472 response_code = 405 uri = /v1/system/ip-pools-service/ranges/add
157112025-03-07T23:30:38.933ZINFOtest_unauthorized (external client test context): client received response status = 405
157122025-03-07T23:30:38.933ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service/ranges/add
157132025-03-07T23:30:38.933ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/ip-pools-service/ranges/remove
157142025-03-07T23:30:38.933ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/ip-pools-service/ranges/remove
157152025-03-07T23:30:38.933ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/ip-pools-service/ranges/remove
157162025-03-07T23:30:38.933ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157172025-03-07T23:30:38.933ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 70eab5d1-77bf-410a-ab91-8f0685c8b316 uri = /v1/system/ip-pools-service/ranges/remove
157182025-03-07T23:30:38.933ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 70eab5d1-77bf-410a-ab91-8f0685c8b316 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157192025-03-07T23:30:38.934ZINFOtest_unauthorized (external client test context): client received response status = 405
157202025-03-07T23:30:38.934ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/ip-pools-service/ranges/remove
157212025-03-07T23:30:38.934ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157222025-03-07T23:30:38.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74b09dc0-74c1-49e1-b052-1bc04da50a4f uri = /v1/system/ip-pools-service/ranges/remove
157232025-03-07T23:30:38.935ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 143 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74b09dc0-74c1-49e1-b052-1bc04da50a4f response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157242025-03-07T23:30:38.935ZINFOtest_unauthorized (external client test context): client received response status = 405
157252025-03-07T23:30:38.935ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/ip-pools-service/ranges/remove
157262025-03-07T23:30:38.935ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157272025-03-07T23:30:38.935ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 49150a08-e78a-4c7e-8162-dbebfeaf3932 uri = /v1/system/ip-pools-service/ranges/remove
157282025-03-07T23:30:38.935ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 49150a08-e78a-4c7e-8162-dbebfeaf3932 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157292025-03-07T23:30:38.935ZINFOtest_unauthorized (external client test context): client received response status = 405
157302025-03-07T23:30:38.936ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/ip-pools-service/ranges/remove
157312025-03-07T23:30:38.936ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157322025-03-07T23:30:38.936ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b2ab0d5-26d3-484f-b248-7419b3b9d61f uri = /v1/system/ip-pools-service/ranges/remove
157332025-03-07T23:30:38.936ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b2ab0d5-26d3-484f-b248-7419b3b9d61f response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157342025-03-07T23:30:38.936ZINFOtest_unauthorized (external client test context): client received response status = 405
157352025-03-07T23:30:38.936ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/ip-pools-service/ranges/remove
157362025-03-07T23:30:38.936ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157372025-03-07T23:30:38.937ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d2291ce5-23f3-4fe9-bc75-b4f41110ad1e uri = /v1/system/ip-pools-service/ranges/remove
157382025-03-07T23:30:38.937ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d2291ce5-23f3-4fe9-bc75-b4f41110ad1e response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157392025-03-07T23:30:38.937ZINFOtest_unauthorized (external client test context): client received response status = 405
157402025-03-07T23:30:38.937ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/ip-pools-service/ranges/remove
157412025-03-07T23:30:38.937ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157422025-03-07T23:30:38.937ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4da037c9-baaa-498e-9f98-4965a591ae04 uri = /v1/system/ip-pools-service/ranges/remove
157432025-03-07T23:30:38.937ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4da037c9-baaa-498e-9f98-4965a591ae04 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157442025-03-07T23:30:38.938ZINFOtest_unauthorized (external client test context): client received response status = 405
157452025-03-07T23:30:38.938ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/ip-pools-service/ranges/remove
157462025-03-07T23:30:38.938ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157472025-03-07T23:30:38.939ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 97443ccc-cb69-4405-b41c-59a111a001d5 uri = /v1/system/ip-pools-service/ranges/remove
157482025-03-07T23:30:38.939ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 146 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 97443ccc-cb69-4405-b41c-59a111a001d5 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157492025-03-07T23:30:38.939ZINFOtest_unauthorized (external client test context): client received response status = 405
157502025-03-07T23:30:38.939ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/ip-pools-service/ranges/remove
157512025-03-07T23:30:38.939ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157522025-03-07T23:30:38.939ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a5d30274-414c-4719-b1ad-846cdffc1784 uri = /v1/system/ip-pools-service/ranges/remove
157532025-03-07T23:30:38.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a5d30274-414c-4719-b1ad-846cdffc1784 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
157542025-03-07T23:30:38.940ZINFOtest_unauthorized (external client test context): client received response status = 405
157552025-03-07T23:30:38.940ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/ip-pools-service/ranges/remove
157562025-03-07T23:30:38.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
157572025-03-07T23:30:38.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 uri = /v1/system/ip-pools-service/ranges/remove
157582025-03-07T23:30:38.940ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 uri = /v1/system/ip-pools-service/ranges/remove
157592025-03-07T23:30:38.941ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/ip-pools-service/ranges/remove
157602025-03-07T23:30:38.941ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157612025-03-07T23:30:38.941ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157622025-03-07T23:30:38.942ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157632025-03-07T23:30:38.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157642025-03-07T23:30:38.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157652025-03-07T23:30:38.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157662025-03-07T23:30:38.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
157672025-03-07T23:30:38.951ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
157682025-03-07T23:30:38.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157692025-03-07T23:30:38.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157702025-03-07T23:30:38.952ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157712025-03-07T23:30:38.955ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
157722025-03-07T23:30:38.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157732025-03-07T23:30:38.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157742025-03-07T23:30:38.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157752025-03-07T23:30:38.969ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
157762025-03-07T23:30:38.973ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
157772025-03-07T23:30:38.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157782025-03-07T23:30:38.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157792025-03-07T23:30:38.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157802025-03-07T23:30:38.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
157812025-03-07T23:30:38.978ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
157822025-03-07T23:30:38.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157832025-03-07T23:30:38.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157842025-03-07T23:30:38.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157852025-03-07T23:30:38.982ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
157862025-03-07T23:30:38.982ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
157872025-03-07T23:30:38.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
157882025-03-07T23:30:38.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
157892025-03-07T23:30:38.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
157902025-03-07T23:30:38.989ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
157912025-03-07T23:30:38.990ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 uri = /v1/system/ip-pools-service/ranges/remove
157922025-03-07T23:30:38.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource = Database uri = /v1/system/ip-pools-service/ranges/remove
157932025-03-07T23:30:38.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
157942025-03-07T23:30:38.990ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/remove
157952025-03-07T23:30:38.992ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } uri = /v1/system/ip-pools-service/ranges/remove
157962025-03-07T23:30:38.992ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools-service/ranges/remove
157972025-03-07T23:30:38.993ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource = Database uri = /v1/system/ip-pools-service/ranges/remove
157982025-03-07T23:30:38.993ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
157992025-03-07T23:30:38.995ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource = Database result = Ok(()) uri = /v1/system/ip-pools-service/ranges/remove
158002025-03-07T23:30:39.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
158012025-03-07T23:30:39.012ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 resource = IpPool { parent: Fleet, key: 3219ef88-9caf-4b2f-a004-cbd6edacec22, lookup_type: ByName("oxide-service-pool") } result = Err(ObjectNotFound { type_name: IpPool, lookup_type: ByName("oxide-service-pool") }) uri = /v1/system/ip-pools-service/ranges/remove
158022025-03-07T23:30:39.012ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: ip-pool with name "oxide-service-pool" error_message_internal = not found: ip-pool with name "oxide-service-pool" latency_us = 71718 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c69f90-7ae9-45ae-89de-410eebfee424 response_code = 404 uri = /v1/system/ip-pools-service/ranges/remove
158032025-03-07T23:30:39.013ZINFOtest_unauthorized (external client test context): client received response status = 404
158042025-03-07T23:30:39.013ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/ip-pools-service/ranges/remove
158052025-03-07T23:30:39.013ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158062025-03-07T23:30:39.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 uri = /v1/system/ip-pools-service/ranges/remove
158072025-03-07T23:30:39.013ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 uri = /v1/system/ip-pools-service/ranges/remove
158082025-03-07T23:30:39.013ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 uri = /v1/system/ip-pools-service/ranges/remove
158092025-03-07T23:30:39.013ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 uri = /v1/system/ip-pools-service/ranges/remove
158102025-03-07T23:30:39.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 resource = Database uri = /v1/system/ip-pools-service/ranges/remove
158112025-03-07T23:30:39.014ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools-service/ranges/remove
158122025-03-07T23:30:39.014ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/ip-pools-service/ranges/remove
158132025-03-07T23:30:39.014ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 880 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6503e85-409a-4ea7-bbfd-fcd405045500 response_code = 401 uri = /v1/system/ip-pools-service/ranges/remove
158142025-03-07T23:30:39.014ZINFOtest_unauthorized (external client test context): client received response status = 401
158152025-03-07T23:30:39.014ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/ip-pools-service/ranges/remove
158162025-03-07T23:30:39.014ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158172025-03-07T23:30:39.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b68c59d0-ce16-4db7-a487-e89c4879522b uri = /v1/system/ip-pools-service/ranges/remove
158182025-03-07T23:30:39.015ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b68c59d0-ce16-4db7-a487-e89c4879522b uri = /v1/system/ip-pools-service/ranges/remove
158192025-03-07T23:30:39.015ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b68c59d0-ce16-4db7-a487-e89c4879522b uri = /v1/system/ip-pools-service/ranges/remove
158202025-03-07T23:30:39.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 261 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b68c59d0-ce16-4db7-a487-e89c4879522b response_code = 401 uri = /v1/system/ip-pools-service/ranges/remove
158212025-03-07T23:30:39.015ZINFOtest_unauthorized (external client test context): client received response status = 401
158222025-03-07T23:30:39.015ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/ip-pools-service/ranges/remove
158232025-03-07T23:30:39.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158242025-03-07T23:30:39.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dfff94ec-9dd4-4863-bf23-da68ccfa9114 uri = /v1/system/ip-pools-service/ranges/remove
158252025-03-07T23:30:39.015ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dfff94ec-9dd4-4863-bf23-da68ccfa9114 uri = /v1/system/ip-pools-service/ranges/remove
158262025-03-07T23:30:39.018ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1522:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1530:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::ip_pool_service_range_remove::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<omicron_common::address::IpRange>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dfff94ec-9dd4-4863-bf23-da68ccfa9114 uri = /v1/system/ip-pools-service/ranges/remove
158272025-03-07T23:30:39.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1452 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dfff94ec-9dd4-4863-bf23-da68ccfa9114 response_code = 401 uri = /v1/system/ip-pools-service/ranges/remove
158282025-03-07T23:30:39.018ZINFOtest_unauthorized (external client test context): client received response status = 401
158292025-03-07T23:30:39.018ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/ip-pools-service/ranges/remove
158302025-03-07T23:30:39.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158312025-03-07T23:30:39.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 37d86d81-3012-4acf-9971-087a5cb6cdc5 uri = /v1/system/ip-pools-service/ranges/remove
158322025-03-07T23:30:39.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 37d86d81-3012-4acf-9971-087a5cb6cdc5 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158332025-03-07T23:30:39.018ZINFOtest_unauthorized (external client test context): client received response status = 405
158342025-03-07T23:30:39.018ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/ip-pools-service/ranges/remove
158352025-03-07T23:30:39.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158362025-03-07T23:30:39.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 39ff1a53-5ab9-49b8-b1d2-8e8f46bd6c74 uri = /v1/system/ip-pools-service/ranges/remove
158372025-03-07T23:30:39.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 39ff1a53-5ab9-49b8-b1d2-8e8f46bd6c74 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158382025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client received response status = 405
158392025-03-07T23:30:39.019ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/ip-pools-service/ranges/remove
158402025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158412025-03-07T23:30:39.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 587ae40a-2d6c-48cc-8cb4-c3669269be4f uri = /v1/system/ip-pools-service/ranges/remove
158422025-03-07T23:30:39.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 587ae40a-2d6c-48cc-8cb4-c3669269be4f response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158432025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client received response status = 405
158442025-03-07T23:30:39.019ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/ip-pools-service/ranges/remove
158452025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158462025-03-07T23:30:39.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c7026e47-8711-4828-aa44-a44fd5523561 uri = /v1/system/ip-pools-service/ranges/remove
158472025-03-07T23:30:39.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c7026e47-8711-4828-aa44-a44fd5523561 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158482025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client received response status = 405
158492025-03-07T23:30:39.019ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/ip-pools-service/ranges/remove
158502025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158512025-03-07T23:30:39.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4e239922-49b6-46c8-9cab-d395f0bb6655 uri = /v1/system/ip-pools-service/ranges/remove
158522025-03-07T23:30:39.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4e239922-49b6-46c8-9cab-d395f0bb6655 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158532025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client received response status = 405
158542025-03-07T23:30:39.019ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/ip-pools-service/ranges/remove
158552025-03-07T23:30:39.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158562025-03-07T23:30:39.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 03a92f12-35ac-4aef-a326-8bb4d90eaad8 uri = /v1/system/ip-pools-service/ranges/remove
158572025-03-07T23:30:39.020ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 03a92f12-35ac-4aef-a326-8bb4d90eaad8 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158582025-03-07T23:30:39.020ZINFOtest_unauthorized (external client test context): client received response status = 405
158592025-03-07T23:30:39.020ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/ip-pools-service/ranges/remove
158602025-03-07T23:30:39.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158612025-03-07T23:30:39.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d0b4895-fff8-4fe8-885e-7de3d76dd023 uri = /v1/system/ip-pools-service/ranges/remove
158622025-03-07T23:30:39.020ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d0b4895-fff8-4fe8-885e-7de3d76dd023 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158632025-03-07T23:30:39.020ZINFOtest_unauthorized (external client test context): client received response status = 405
158642025-03-07T23:30:39.020ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/ip-pools-service/ranges/remove
158652025-03-07T23:30:39.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/ip-pools-service/ranges/remove
158662025-03-07T23:30:39.021ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 63d80d2c-fb1a-4bc8-ac2c-511daa398cb6 uri = /v1/system/ip-pools-service/ranges/remove
158672025-03-07T23:30:39.021ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 63d80d2c-fb1a-4bc8-ac2c-511daa398cb6 response_code = 405 uri = /v1/system/ip-pools-service/ranges/remove
158682025-03-07T23:30:39.021ZINFOtest_unauthorized (external client test context): client received response status = 405
158692025-03-07T23:30:39.021ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/ip-pools-service/ranges/remove
158702025-03-07T23:30:39.021ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos
158712025-03-07T23:30:39.021ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos
158722025-03-07T23:30:39.021ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos
158732025-03-07T23:30:39.021ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 uri = /v1/system/silos
158742025-03-07T23:30:39.021ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 uri = /v1/system/silos
158752025-03-07T23:30:39.021ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos
158762025-03-07T23:30:39.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158772025-03-07T23:30:39.022ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158782025-03-07T23:30:39.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158792025-03-07T23:30:39.042ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158802025-03-07T23:30:39.042ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158812025-03-07T23:30:39.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158822025-03-07T23:30:39.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
158832025-03-07T23:30:39.054ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
158842025-03-07T23:30:39.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158852025-03-07T23:30:39.054ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158862025-03-07T23:30:39.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158872025-03-07T23:30:39.062ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
158882025-03-07T23:30:39.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158892025-03-07T23:30:39.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158902025-03-07T23:30:39.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158912025-03-07T23:30:39.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
158922025-03-07T23:30:39.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
158932025-03-07T23:30:39.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158942025-03-07T23:30:39.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
158952025-03-07T23:30:39.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
158962025-03-07T23:30:39.076ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
158972025-03-07T23:30:39.076ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
158982025-03-07T23:30:39.076ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
158992025-03-07T23:30:39.076ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159002025-03-07T23:30:39.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159012025-03-07T23:30:39.080ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
159022025-03-07T23:30:39.080ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159032025-03-07T23:30:39.080ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159042025-03-07T23:30:39.084ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159052025-03-07T23:30:39.091ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
159062025-03-07T23:30:39.096ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
159072025-03-07T23:30:39.096ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 uri = /v1/system/silos
159082025-03-07T23:30:39.097ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource = Fleet uri = /v1/system/silos
159092025-03-07T23:30:39.097ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
159102025-03-07T23:30:39.097ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource = Database uri = /v1/system/silos
159112025-03-07T23:30:39.097ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 roles = RoleSet { roles: {} } uri = /v1/system/silos
159122025-03-07T23:30:39.097ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource = Database result = Ok(()) uri = /v1/system/silos
159132025-03-07T23:30:39.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
159142025-03-07T23:30:39.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource = Fleet result = Ok(()) uri = /v1/system/silos
159152025-03-07T23:30:39.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource = Database uri = /v1/system/silos
159162025-03-07T23:30:39.111ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 roles = RoleSet { roles: {} } uri = /v1/system/silos
159172025-03-07T23:30:39.113ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 resource = Database result = Ok(()) uri = /v1/system/silos
159182025-03-07T23:30:39.118ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 96733 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e6e50b4-32e7-49dc-bb29-99adbad7f4b8 response_code = 200 uri = /v1/system/silos
159192025-03-07T23:30:39.119ZINFOtest_unauthorized (external client test context): client received response status = 200
159202025-03-07T23:30:39.119ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos
159212025-03-07T23:30:39.119ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos
159222025-03-07T23:30:39.120ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 uri = /v1/system/silos
159232025-03-07T23:30:39.120ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 uri = /v1/system/silos
159242025-03-07T23:30:39.120ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos
159252025-03-07T23:30:39.120ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159262025-03-07T23:30:39.120ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159272025-03-07T23:30:39.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159282025-03-07T23:30:39.124ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159292025-03-07T23:30:39.124ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159302025-03-07T23:30:39.125ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159312025-03-07T23:30:39.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
159322025-03-07T23:30:39.127ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
159332025-03-07T23:30:39.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159342025-03-07T23:30:39.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159352025-03-07T23:30:39.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159362025-03-07T23:30:39.130ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
159372025-03-07T23:30:39.130ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159382025-03-07T23:30:39.130ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159392025-03-07T23:30:39.131ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159402025-03-07T23:30:39.133ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
159412025-03-07T23:30:39.138ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
159422025-03-07T23:30:39.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159432025-03-07T23:30:39.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159442025-03-07T23:30:39.138ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159452025-03-07T23:30:39.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
159462025-03-07T23:30:39.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
159472025-03-07T23:30:39.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159482025-03-07T23:30:39.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159492025-03-07T23:30:39.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159502025-03-07T23:30:39.143ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
159512025-03-07T23:30:39.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
159522025-03-07T23:30:39.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
159532025-03-07T23:30:39.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
159542025-03-07T23:30:39.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
159552025-03-07T23:30:39.150ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
159562025-03-07T23:30:39.150ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 uri = /v1/system/silos
159572025-03-07T23:30:39.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 resource = Fleet uri = /v1/system/silos
159582025-03-07T23:30:39.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
159592025-03-07T23:30:39.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 resource = Database uri = /v1/system/silos
159602025-03-07T23:30:39.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 roles = RoleSet { roles: {} } uri = /v1/system/silos
159612025-03-07T23:30:39.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 resource = Database result = Ok(()) uri = /v1/system/silos
159622025-03-07T23:30:39.154ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 roles = RoleSet { roles: {} } uri = /v1/system/silos
159632025-03-07T23:30:39.167ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 resource = Fleet result = Err(Forbidden) uri = /v1/system/silos
159642025-03-07T23:30:39.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 47138 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4ec033e0-017a-4a4b-b9dd-75643eec3865 response_code = 403 uri = /v1/system/silos
159652025-03-07T23:30:39.168ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
159662025-03-07T23:30:39.168ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
159672025-03-07T23:30:39.168ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
159682025-03-07T23:30:39.169ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
159692025-03-07T23:30:39.169ZINFOtest_unauthorized (external client test context): client received response status = 403
159702025-03-07T23:30:39.169ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos
159712025-03-07T23:30:39.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos
159722025-03-07T23:30:39.169ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee uri = /v1/system/silos
159732025-03-07T23:30:39.169ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee uri = /v1/system/silos
159742025-03-07T23:30:39.169ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee uri = /v1/system/silos
159752025-03-07T23:30:39.169ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee uri = /v1/system/silos
159762025-03-07T23:30:39.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee resource = Fleet uri = /v1/system/silos
159772025-03-07T23:30:39.169ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee roles = RoleSet { roles: {} } uri = /v1/system/silos
159782025-03-07T23:30:39.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos
159792025-03-07T23:30:39.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 731 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 339ad851-fe0b-4dab-ab37-e10b3dd27fee response_code = 401 uri = /v1/system/silos
159802025-03-07T23:30:39.170ZINFOtest_unauthorized (external client test context): client received response status = 401
159812025-03-07T23:30:39.171ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos
159822025-03-07T23:30:39.171ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos
159832025-03-07T23:30:39.171ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9401fd9-7946-4877-b6a5-c81661fb48d2 uri = /v1/system/silos
159842025-03-07T23:30:39.171ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9401fd9-7946-4877-b6a5-c81661fb48d2 uri = /v1/system/silos
159852025-03-07T23:30:39.171ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9401fd9-7946-4877-b6a5-c81661fb48d2 uri = /v1/system/silos
159862025-03-07T23:30:39.171ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 333 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9401fd9-7946-4877-b6a5-c81661fb48d2 response_code = 401 uri = /v1/system/silos
159872025-03-07T23:30:39.171ZINFOtest_unauthorized (external client test context): client received response status = 401
159882025-03-07T23:30:39.171ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos
159892025-03-07T23:30:39.171ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos
159902025-03-07T23:30:39.172ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fa60cfeb-7971-4b6c-a197-f8d41b42b89f uri = /v1/system/silos
159912025-03-07T23:30:39.172ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fa60cfeb-7971-4b6c-a197-f8d41b42b89f uri = /v1/system/silos
159922025-03-07T23:30:39.173ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:403:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Silo>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:420:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Silo>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Silo>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fa60cfeb-7971-4b6c-a197-f8d41b42b89f uri = /v1/system/silos
159932025-03-07T23:30:39.173ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1137 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fa60cfeb-7971-4b6c-a197-f8d41b42b89f response_code = 401 uri = /v1/system/silos
159942025-03-07T23:30:39.173ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
159952025-03-07T23:30:39.173ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
159962025-03-07T23:30:39.173ZINFOtest_unauthorized (external client test context): client received response status = 401
159972025-03-07T23:30:39.173ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos
159982025-03-07T23:30:39.173ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos
159992025-03-07T23:30:39.173ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 44d380f3-8056-4d95-94f8-3ed10c3e6bca uri = /v1/system/silos
160002025-03-07T23:30:39.173ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 44d380f3-8056-4d95-94f8-3ed10c3e6bca response_code = 405 uri = /v1/system/silos
160012025-03-07T23:30:39.174ZINFOtest_unauthorized (external client test context): client received response status = 405
160022025-03-07T23:30:39.174ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos
160032025-03-07T23:30:39.174ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos
160042025-03-07T23:30:39.174ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 785758ba-4ad1-4894-9020-c537463c81bd uri = /v1/system/silos
160052025-03-07T23:30:39.174ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 785758ba-4ad1-4894-9020-c537463c81bd response_code = 405 uri = /v1/system/silos
160062025-03-07T23:30:39.174ZINFOtest_unauthorized (external client test context): client received response status = 405
160072025-03-07T23:30:39.174ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos
160082025-03-07T23:30:39.175ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos
160092025-03-07T23:30:39.175ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4949210f-498b-4ce0-b024-705effa3ce23 uri = /v1/system/silos
160102025-03-07T23:30:39.175ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4949210f-498b-4ce0-b024-705effa3ce23 response_code = 405 uri = /v1/system/silos
160112025-03-07T23:30:39.175ZINFOtest_unauthorized (external client test context): client received response status = 405
160122025-03-07T23:30:39.175ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos
160132025-03-07T23:30:39.175ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos
160142025-03-07T23:30:39.175ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 266aeeea-bea8-4913-aed3-5f72cd64cdcf uri = /v1/system/silos
160152025-03-07T23:30:39.175ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 266aeeea-bea8-4913-aed3-5f72cd64cdcf response_code = 405 uri = /v1/system/silos
160162025-03-07T23:30:39.175ZINFOtest_unauthorized (external client test context): client received response status = 405
160172025-03-07T23:30:39.175ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos
160182025-03-07T23:30:39.175ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos
160192025-03-07T23:30:39.176ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b uri = /v1/system/silos
160202025-03-07T23:30:39.176ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b uri = /v1/system/silos
160212025-03-07T23:30:39.176ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos
160222025-03-07T23:30:39.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160232025-03-07T23:30:39.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160242025-03-07T23:30:39.177ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160252025-03-07T23:30:39.177ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
160262025-03-07T23:30:39.177ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
160272025-03-07T23:30:39.179ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160282025-03-07T23:30:39.179ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160292025-03-07T23:30:39.179ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160302025-03-07T23:30:39.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
160312025-03-07T23:30:39.182ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
160322025-03-07T23:30:39.182ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160332025-03-07T23:30:39.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160342025-03-07T23:30:39.182ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160352025-03-07T23:30:39.184ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160362025-03-07T23:30:39.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160372025-03-07T23:30:39.184ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160382025-03-07T23:30:39.185ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160392025-03-07T23:30:39.186ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160402025-03-07T23:30:39.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
160412025-03-07T23:30:39.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160422025-03-07T23:30:39.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160432025-03-07T23:30:39.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160442025-03-07T23:30:39.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
160452025-03-07T23:30:39.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
160462025-03-07T23:30:39.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160472025-03-07T23:30:39.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160482025-03-07T23:30:39.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160492025-03-07T23:30:39.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160502025-03-07T23:30:39.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160512025-03-07T23:30:39.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160522025-03-07T23:30:39.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160532025-03-07T23:30:39.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160542025-03-07T23:30:39.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
160552025-03-07T23:30:39.203ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b uri = /v1/system/silos
160562025-03-07T23:30:39.203ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160572025-03-07T23:30:39.203ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160582025-03-07T23:30:39.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160592025-03-07T23:30:39.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
160602025-03-07T23:30:39.205ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160612025-03-07T23:30:39.205ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160622025-03-07T23:30:39.205ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160632025-03-07T23:30:39.206ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160642025-03-07T23:30:39.207ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160652025-03-07T23:30:39.212ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
160662025-03-07T23:30:39.213ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b resource = BlueprintConfig uri = /v1/system/silos
160672025-03-07T23:30:39.213ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
160682025-03-07T23:30:39.213ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b resource = Database uri = /v1/system/silos
160692025-03-07T23:30:39.213ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b roles = RoleSet { roles: {} } uri = /v1/system/silos
160702025-03-07T23:30:39.214ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b resource = Database result = Ok(()) uri = /v1/system/silos
160712025-03-07T23:30:39.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b roles = RoleSet { roles: {} } uri = /v1/system/silos
160722025-03-07T23:30:39.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b resource = BlueprintConfig result = Err(Forbidden) uri = /v1/system/silos
160732025-03-07T23:30:39.229ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 53662 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06bad39b-1e91-460a-9858-e91f789d947b response_code = 403 uri = /v1/system/silos
160742025-03-07T23:30:39.230ZINFOtest_unauthorized (external client test context): client received response status = 403
160752025-03-07T23:30:39.230ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos
160762025-03-07T23:30:39.230ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos
160772025-03-07T23:30:39.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 uri = /v1/system/silos
160782025-03-07T23:30:39.231ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 uri = /v1/system/silos
160792025-03-07T23:30:39.231ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 uri = /v1/system/silos
160802025-03-07T23:30:39.231ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 uri = /v1/system/silos
160812025-03-07T23:30:39.231ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160822025-03-07T23:30:39.231ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160832025-03-07T23:30:39.231ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160842025-03-07T23:30:39.232ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig
160852025-03-07T23:30:39.232ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
160862025-03-07T23:30:39.232ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
160872025-03-07T23:30:39.233ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
160882025-03-07T23:30:39.234ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
160892025-03-07T23:30:39.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
160902025-03-07T23:30:39.257ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = DnsConfig result = Ok(())
160912025-03-07T23:30:39.259ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 resource = BlueprintConfig uri = /v1/system/silos
160922025-03-07T23:30:39.259ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 roles = RoleSet { roles: {} } uri = /v1/system/silos
160932025-03-07T23:30:39.259ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 resource = BlueprintConfig result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos
160942025-03-07T23:30:39.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = loading target blueprint: authorization failed for unauthenticated request latency_us = 28748 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f080d1f-4ffa-4357-9579-f1150eb0eea4 response_code = 401 uri = /v1/system/silos
160952025-03-07T23:30:39.260ZINFOtest_unauthorized (external client test context): client received response status = 401
160962025-03-07T23:30:39.260ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos
160972025-03-07T23:30:39.260ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos
160982025-03-07T23:30:39.260ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 80c9bb13-5326-4896-bd0b-2e93c256b88c uri = /v1/system/silos
160992025-03-07T23:30:39.261ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 80c9bb13-5326-4896-bd0b-2e93c256b88c uri = /v1/system/silos
161002025-03-07T23:30:39.261ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 80c9bb13-5326-4896-bd0b-2e93c256b88c uri = /v1/system/silos
161012025-03-07T23:30:39.261ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 370 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 80c9bb13-5326-4896-bd0b-2e93c256b88c response_code = 401 uri = /v1/system/silos
161022025-03-07T23:30:39.261ZINFOtest_unauthorized (external client test context): client received response status = 401
161032025-03-07T23:30:39.261ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos
161042025-03-07T23:30:39.261ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos
161052025-03-07T23:30:39.261ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9cc4cb06-ccbf-402d-b4f0-f434565752fa uri = /v1/system/silos
161062025-03-07T23:30:39.261ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9cc4cb06-ccbf-402d-b4f0-f434565752fa uri = /v1/system/silos
161072025-03-07T23:30:39.263ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:430:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Silo>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:440:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Silo>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_create::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Silo>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9cc4cb06-ccbf-402d-b4f0-f434565752fa uri = /v1/system/silos
161082025-03-07T23:30:39.263ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1130 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9cc4cb06-ccbf-402d-b4f0-f434565752fa response_code = 401 uri = /v1/system/silos
161092025-03-07T23:30:39.263ZINFOtest_unauthorized (external client test context): client received response status = 401
161102025-03-07T23:30:39.263ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos
161112025-03-07T23:30:39.263ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos
161122025-03-07T23:30:39.263ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8cd92c21-1ba9-4eb9-a44c-6acd623ecae5 uri = /v1/system/silos
161132025-03-07T23:30:39.263ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8cd92c21-1ba9-4eb9-a44c-6acd623ecae5 response_code = 405 uri = /v1/system/silos
161142025-03-07T23:30:39.263ZINFOtest_unauthorized (external client test context): client received response status = 405
161152025-03-07T23:30:39.263ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos
161162025-03-07T23:30:39.263ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos
161172025-03-07T23:30:39.263ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 46f873e1-1e40-46dc-924a-b04e80ab0626 uri = /v1/system/silos
161182025-03-07T23:30:39.264ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 46f873e1-1e40-46dc-924a-b04e80ab0626 response_code = 405 uri = /v1/system/silos
161192025-03-07T23:30:39.264ZINFOtest_unauthorized (external client test context): client received response status = 405
161202025-03-07T23:30:39.264ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos
161212025-03-07T23:30:39.264ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos
161222025-03-07T23:30:39.264ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0f4d6db7-7d8a-4016-b5fe-410916b8ad71 uri = /v1/system/silos
161232025-03-07T23:30:39.264ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 136 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0f4d6db7-7d8a-4016-b5fe-410916b8ad71 response_code = 405 uri = /v1/system/silos
161242025-03-07T23:30:39.264ZINFOtest_unauthorized (external client test context): client received response status = 405
161252025-03-07T23:30:39.264ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos
161262025-03-07T23:30:39.264ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos
161272025-03-07T23:30:39.265ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f273a24d-5455-4fcf-9f24-7c25b1c98dbe uri = /v1/system/silos
161282025-03-07T23:30:39.265ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f273a24d-5455-4fcf-9f24-7c25b1c98dbe response_code = 405 uri = /v1/system/silos
161292025-03-07T23:30:39.265ZINFOtest_unauthorized (external client test context): client received response status = 405
161302025-03-07T23:30:39.265ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos
161312025-03-07T23:30:39.265ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos
161322025-03-07T23:30:39.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 74c178ce-9887-41c4-8cfd-dbf83857cecd uri = /v1/system/silos
161332025-03-07T23:30:39.266ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 446 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 74c178ce-9887-41c4-8cfd-dbf83857cecd response_code = 405 uri = /v1/system/silos
161342025-03-07T23:30:39.266ZINFOtest_unauthorized (external client test context): client received response status = 405
161352025-03-07T23:30:39.266ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos
161362025-03-07T23:30:39.266ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos
161372025-03-07T23:30:39.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b159efae-c34f-46c3-ac8d-82d270b1ea6e uri = /v1/system/silos
161382025-03-07T23:30:39.266ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b159efae-c34f-46c3-ac8d-82d270b1ea6e response_code = 405 uri = /v1/system/silos
161392025-03-07T23:30:39.267ZINFOtest_unauthorized (external client test context): client received response status = 405
161402025-03-07T23:30:39.267ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos
161412025-03-07T23:30:39.267ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos
161422025-03-07T23:30:39.267ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3f9b3613-0c2f-4d4c-82dc-a05a4b22bb36 uri = /v1/system/silos
161432025-03-07T23:30:39.267ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3f9b3613-0c2f-4d4c-82dc-a05a4b22bb36 response_code = 405 uri = /v1/system/silos
161442025-03-07T23:30:39.267ZINFOtest_unauthorized (external client test context): client received response status = 405
161452025-03-07T23:30:39.267ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos
161462025-03-07T23:30:39.267ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos
161472025-03-07T23:30:39.268ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8d5bed72-02ee-47d5-995a-79650fee5da8 uri = /v1/system/silos
161482025-03-07T23:30:39.268ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 202 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8d5bed72-02ee-47d5-995a-79650fee5da8 response_code = 405 uri = /v1/system/silos
161492025-03-07T23:30:39.268ZINFOtest_unauthorized (external client test context): client received response status = 405
161502025-03-07T23:30:39.268ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos
161512025-03-07T23:30:39.268ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos
161522025-03-07T23:30:39.269ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
161532025-03-07T23:30:39.269ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac uri = /v1/system/silos
161542025-03-07T23:30:39.269ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac uri = /v1/system/silos
161552025-03-07T23:30:39.269ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos
161562025-03-07T23:30:39.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161572025-03-07T23:30:39.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161582025-03-07T23:30:39.271ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161592025-03-07T23:30:39.279ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161602025-03-07T23:30:39.279ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161612025-03-07T23:30:39.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161622025-03-07T23:30:39.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
161632025-03-07T23:30:39.289ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
161642025-03-07T23:30:39.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161652025-03-07T23:30:39.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161662025-03-07T23:30:39.292ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161672025-03-07T23:30:39.300ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
161682025-03-07T23:30:39.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161692025-03-07T23:30:39.300ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161702025-03-07T23:30:39.302ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161712025-03-07T23:30:39.304ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
161722025-03-07T23:30:39.308ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
161732025-03-07T23:30:39.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161742025-03-07T23:30:39.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161752025-03-07T23:30:39.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161762025-03-07T23:30:39.321ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
161772025-03-07T23:30:39.321ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
161782025-03-07T23:30:39.321ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161792025-03-07T23:30:39.321ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161802025-03-07T23:30:39.322ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161812025-03-07T23:30:39.326ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
161822025-03-07T23:30:39.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
161832025-03-07T23:30:39.326ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
161842025-03-07T23:30:39.326ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
161852025-03-07T23:30:39.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
161862025-03-07T23:30:39.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
161872025-03-07T23:30:39.336ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac uri = /v1/system/silos
161882025-03-07T23:30:39.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource = Fleet uri = /v1/system/silos
161892025-03-07T23:30:39.336ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos
161902025-03-07T23:30:39.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource = Database uri = /v1/system/silos
161912025-03-07T23:30:39.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac roles = RoleSet { roles: {} } uri = /v1/system/silos
161922025-03-07T23:30:39.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource = Database result = Ok(()) uri = /v1/system/silos
161932025-03-07T23:30:39.340ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos
161942025-03-07T23:30:39.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource = Fleet result = Ok(()) uri = /v1/system/silos
161952025-03-07T23:30:39.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource = Database uri = /v1/system/silos
161962025-03-07T23:30:39.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac roles = RoleSet { roles: {} } uri = /v1/system/silos
161972025-03-07T23:30:39.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac resource = Database result = Ok(()) uri = /v1/system/silos
161982025-03-07T23:30:39.354ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 84626 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4e267e5b-498b-41b3-a219-9c497dcd19ac response_code = 200 uri = /v1/system/silos
161992025-03-07T23:30:39.354ZINFOtest_unauthorized (external client test context): client received response status = 200
162002025-03-07T23:30:39.355ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo
162012025-03-07T23:30:39.355ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo
162022025-03-07T23:30:39.355ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
162032025-03-07T23:30:39.355ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 uri = /v1/system/silos/demo-silo
162042025-03-07T23:30:39.356ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 uri = /v1/system/silos/demo-silo
162052025-03-07T23:30:39.356ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo
162062025-03-07T23:30:39.356ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162072025-03-07T23:30:39.356ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162082025-03-07T23:30:39.357ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162092025-03-07T23:30:39.360ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162102025-03-07T23:30:39.360ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162112025-03-07T23:30:39.360ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162122025-03-07T23:30:39.363ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
162132025-03-07T23:30:39.363ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
162142025-03-07T23:30:39.363ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162152025-03-07T23:30:39.363ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162162025-03-07T23:30:39.363ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162172025-03-07T23:30:39.365ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
162182025-03-07T23:30:39.365ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162192025-03-07T23:30:39.365ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162202025-03-07T23:30:39.366ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162212025-03-07T23:30:39.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
162222025-03-07T23:30:39.373ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
162232025-03-07T23:30:39.373ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162242025-03-07T23:30:39.373ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162252025-03-07T23:30:39.373ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162262025-03-07T23:30:39.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
162272025-03-07T23:30:39.375ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
162282025-03-07T23:30:39.375ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162292025-03-07T23:30:39.375ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162302025-03-07T23:30:39.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162312025-03-07T23:30:39.379ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
162322025-03-07T23:30:39.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162332025-03-07T23:30:39.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162342025-03-07T23:30:39.380ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162352025-03-07T23:30:39.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
162362025-03-07T23:30:39.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
162372025-03-07T23:30:39.411ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 uri = /v1/system/silos/demo-silo
162382025-03-07T23:30:39.411ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Database uri = /v1/system/silos/demo-silo
162392025-03-07T23:30:39.411ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162402025-03-07T23:30:39.412ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
162412025-03-07T23:30:39.412ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
162422025-03-07T23:30:39.413ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
162432025-03-07T23:30:39.414ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c5ee21ce-0444-40c7-a86c-ae4b38b9c65f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
162442025-03-07T23:30:39.414ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c5ee21ce-0444-40c7-a86c-ae4b38b9c65f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
162452025-03-07T23:30:39.414ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c5ee21ce-0444-40c7-a86c-ae4b38b9c65f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
162462025-03-07T23:30:39.415ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c5ee21ce-0444-40c7-a86c-ae4b38b9c65f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
162472025-03-07T23:30:39.416ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
162482025-03-07T23:30:39.416ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo
162492025-03-07T23:30:39.416ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Database uri = /v1/system/silos/demo-silo
162502025-03-07T23:30:39.417ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162512025-03-07T23:30:39.420ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
162522025-03-07T23:30:39.427ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14310 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = c5ee21ce-0444-40c7-a86c-ae4b38b9c65f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
162532025-03-07T23:30:39.430ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
162542025-03-07T23:30:39.431ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Database uri = /v1/system/silos/demo-silo
162552025-03-07T23:30:39.431ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
162562025-03-07T23:30:39.440ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
162572025-03-07T23:30:39.440ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c5ee21ce-0444-40c7-a86c-ae4b38b9c65f", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:39 GMT"} })
162582025-03-07T23:30:39.440ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
162592025-03-07T23:30:39.462ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0de87f4d-3aba-491f-bf77-2982f1d41de9 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
162602025-03-07T23:30:39.465ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0de87f4d-3aba-491f-bf77-2982f1d41de9 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
162612025-03-07T23:30:39.465ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0de87f4d-3aba-491f-bf77-2982f1d41de9 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
162622025-03-07T23:30:39.465ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0de87f4d-3aba-491f-bf77-2982f1d41de9 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
162632025-03-07T23:30:39.465ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo
162642025-03-07T23:30:39.484ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo
162652025-03-07T23:30:39.485ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 129856 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f5b046e-9bd0-4b89-9eee-19e6de64e7f8 response_code = 200 uri = /v1/system/silos/demo-silo
162662025-03-07T23:30:39.488ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 25545 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0de87f4d-3aba-491f-bf77-2982f1d41de9 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
162672025-03-07T23:30:39.489ZINFOtest_unauthorized (external client test context): client received response status = 200
162682025-03-07T23:30:39.489ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo
162692025-03-07T23:30:39.489ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
162702025-03-07T23:30:39.489ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "0de87f4d-3aba-491f-bf77-2982f1d41de9", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:39 GMT"} })
162712025-03-07T23:30:39.490ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
162722025-03-07T23:30:39.490ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
162732025-03-07T23:30:39.490ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
162742025-03-07T23:30:39.490ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be uri = /v1/system/silos/demo-silo
162752025-03-07T23:30:39.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be uri = /v1/system/silos/demo-silo
162762025-03-07T23:30:39.492ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo
162772025-03-07T23:30:39.493ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162782025-03-07T23:30:39.493ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162792025-03-07T23:30:39.495ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162802025-03-07T23:30:39.503ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162812025-03-07T23:30:39.503ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162822025-03-07T23:30:39.505ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162832025-03-07T23:30:39.511ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
162842025-03-07T23:30:39.511ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
162852025-03-07T23:30:39.511ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162862025-03-07T23:30:39.512ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162872025-03-07T23:30:39.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162882025-03-07T23:30:39.525ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
162892025-03-07T23:30:39.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162902025-03-07T23:30:39.526ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162912025-03-07T23:30:39.527ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162922025-03-07T23:30:39.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
162932025-03-07T23:30:39.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
162942025-03-07T23:30:39.533ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
162952025-03-07T23:30:39.533ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
162962025-03-07T23:30:39.534ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
162972025-03-07T23:30:39.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
162982025-03-07T23:30:39.537ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
162992025-03-07T23:30:39.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163002025-03-07T23:30:39.537ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163012025-03-07T23:30:39.538ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163022025-03-07T23:30:39.541ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
163032025-03-07T23:30:39.541ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
163042025-03-07T23:30:39.541ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
163052025-03-07T23:30:39.542ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
163062025-03-07T23:30:39.545ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
163072025-03-07T23:30:39.551ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
163082025-03-07T23:30:39.552ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be uri = /v1/system/silos/demo-silo
163092025-03-07T23:30:39.552ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Database uri = /v1/system/silos/demo-silo
163102025-03-07T23:30:39.552ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163112025-03-07T23:30:39.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
163122025-03-07T23:30:39.574ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
163132025-03-07T23:30:39.574ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
163142025-03-07T23:30:39.576ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
163152025-03-07T23:30:39.577ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
163162025-03-07T23:30:39.577ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
163172025-03-07T23:30:39.577ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
163182025-03-07T23:30:39.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
163192025-03-07T23:30:39.577ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo
163202025-03-07T23:30:39.578ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Database uri = /v1/system/silos/demo-silo
163212025-03-07T23:30:39.578ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163222025-03-07T23:30:39.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
163232025-03-07T23:30:39.602ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
163242025-03-07T23:30:39.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Database uri = /v1/system/silos/demo-silo
163252025-03-07T23:30:39.603ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163262025-03-07T23:30:39.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
163272025-03-07T23:30:39.615ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163282025-03-07T23:30:39.626ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo
163292025-03-07T23:30:39.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 136009 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c3cf333a-83b0-4564-9f87-02529e03b3be response_code = 404 uri = /v1/system/silos/demo-silo
163302025-03-07T23:30:39.627ZINFOtest_unauthorized (external client test context): client received response status = 404
163312025-03-07T23:30:39.627ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo
163322025-03-07T23:30:39.627ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163332025-03-07T23:30:39.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 uri = /v1/system/silos/demo-silo
163342025-03-07T23:30:39.628ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 uri = /v1/system/silos/demo-silo
163352025-03-07T23:30:39.628ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 uri = /v1/system/silos/demo-silo
163362025-03-07T23:30:39.628ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 uri = /v1/system/silos/demo-silo
163372025-03-07T23:30:39.628ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 resource = Database uri = /v1/system/silos/demo-silo
163382025-03-07T23:30:39.628ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
163392025-03-07T23:30:39.629ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo
163402025-03-07T23:30:39.629ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1374 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9837c854-2195-4a7e-b86e-80e81a6e8a51 response_code = 401 uri = /v1/system/silos/demo-silo
163412025-03-07T23:30:39.629ZINFOtest_unauthorized (external client test context): client received response status = 401
163422025-03-07T23:30:39.629ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo
163432025-03-07T23:30:39.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163442025-03-07T23:30:39.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = adc86f7b-0e97-4a72-901e-433661a84299 uri = /v1/system/silos/demo-silo
163452025-03-07T23:30:39.630ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = adc86f7b-0e97-4a72-901e-433661a84299 uri = /v1/system/silos/demo-silo
163462025-03-07T23:30:39.630ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = adc86f7b-0e97-4a72-901e-433661a84299 uri = /v1/system/silos/demo-silo
163472025-03-07T23:30:39.630ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 459 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = adc86f7b-0e97-4a72-901e-433661a84299 response_code = 401 uri = /v1/system/silos/demo-silo
163482025-03-07T23:30:39.630ZINFOtest_unauthorized (external client test context): client received response status = 401
163492025-03-07T23:30:39.630ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo
163502025-03-07T23:30:39.631ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163512025-03-07T23:30:39.631ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 062818bd-52eb-486c-a6e8-71666aa3584f uri = /v1/system/silos/demo-silo
163522025-03-07T23:30:39.631ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 062818bd-52eb-486c-a6e8-71666aa3584f uri = /v1/system/silos/demo-silo
163532025-03-07T23:30:39.632ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:450:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Silo>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:461:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Silo>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Silo>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 062818bd-52eb-486c-a6e8-71666aa3584f uri = /v1/system/silos/demo-silo
163542025-03-07T23:30:39.632ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1759 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 062818bd-52eb-486c-a6e8-71666aa3584f response_code = 401 uri = /v1/system/silos/demo-silo
163552025-03-07T23:30:39.633ZINFOtest_unauthorized (external client test context): client received response status = 401
163562025-03-07T23:30:39.633ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo
163572025-03-07T23:30:39.633ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163582025-03-07T23:30:39.633ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 75a99655-dc55-4207-9779-3ef766e6ac51 uri = /v1/system/silos/demo-silo
163592025-03-07T23:30:39.633ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 75a99655-dc55-4207-9779-3ef766e6ac51 response_code = 405 uri = /v1/system/silos/demo-silo
163602025-03-07T23:30:39.634ZINFOtest_unauthorized (external client test context): client received response status = 405
163612025-03-07T23:30:39.634ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo
163622025-03-07T23:30:39.634ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163632025-03-07T23:30:39.634ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1a3224d-0ce3-472d-a454-f91a965d8534 uri = /v1/system/silos/demo-silo
163642025-03-07T23:30:39.634ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 114 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1a3224d-0ce3-472d-a454-f91a965d8534 response_code = 405 uri = /v1/system/silos/demo-silo
163652025-03-07T23:30:39.634ZINFOtest_unauthorized (external client test context): client received response status = 405
163662025-03-07T23:30:39.634ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo
163672025-03-07T23:30:39.634ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163682025-03-07T23:30:39.634ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ce3fd9b7-79ac-4d91-848f-4203b1791f2b uri = /v1/system/silos/demo-silo
163692025-03-07T23:30:39.635ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ce3fd9b7-79ac-4d91-848f-4203b1791f2b response_code = 405 uri = /v1/system/silos/demo-silo
163702025-03-07T23:30:39.636ZINFOtest_unauthorized (external client test context): client received response status = 405
163712025-03-07T23:30:39.636ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo
163722025-03-07T23:30:39.636ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163732025-03-07T23:30:39.636ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30958620-f642-43d5-a281-97a68b3906ed uri = /v1/system/silos/demo-silo
163742025-03-07T23:30:39.637ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30958620-f642-43d5-a281-97a68b3906ed response_code = 405 uri = /v1/system/silos/demo-silo
163752025-03-07T23:30:39.637ZINFOtest_unauthorized (external client test context): client received response status = 405
163762025-03-07T23:30:39.637ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo
163772025-03-07T23:30:39.637ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163782025-03-07T23:30:39.637ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0b172417-f613-489d-8b94-a079b1641676 uri = /v1/system/silos/demo-silo
163792025-03-07T23:30:39.637ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0b172417-f613-489d-8b94-a079b1641676 response_code = 405 uri = /v1/system/silos/demo-silo
163802025-03-07T23:30:39.637ZINFOtest_unauthorized (external client test context): client received response status = 405
163812025-03-07T23:30:39.637ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo
163822025-03-07T23:30:39.637ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163832025-03-07T23:30:39.637ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b9f63675-d518-40c2-bb14-b7fb8370020f uri = /v1/system/silos/demo-silo
163842025-03-07T23:30:39.637ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b9f63675-d518-40c2-bb14-b7fb8370020f response_code = 405 uri = /v1/system/silos/demo-silo
163852025-03-07T23:30:39.638ZINFOtest_unauthorized (external client test context): client received response status = 405
163862025-03-07T23:30:39.638ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo
163872025-03-07T23:30:39.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163882025-03-07T23:30:39.638ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 94b1e2e0-c13c-4f40-85b3-04ae880ecd68 uri = /v1/system/silos/demo-silo
163892025-03-07T23:30:39.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 94b1e2e0-c13c-4f40-85b3-04ae880ecd68 response_code = 405 uri = /v1/system/silos/demo-silo
163902025-03-07T23:30:39.638ZINFOtest_unauthorized (external client test context): client received response status = 405
163912025-03-07T23:30:39.638ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo
163922025-03-07T23:30:39.638ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163932025-03-07T23:30:39.639ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 05064208-7797-4b3c-96d4-7e8fc80622bf uri = /v1/system/silos/demo-silo
163942025-03-07T23:30:39.639ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 05064208-7797-4b3c-96d4-7e8fc80622bf response_code = 405 uri = /v1/system/silos/demo-silo
163952025-03-07T23:30:39.639ZINFOtest_unauthorized (external client test context): client received response status = 405
163962025-03-07T23:30:39.639ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo
163972025-03-07T23:30:39.639ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
163982025-03-07T23:30:39.639ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 uri = /v1/system/silos/demo-silo
163992025-03-07T23:30:39.639ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 uri = /v1/system/silos/demo-silo
164002025-03-07T23:30:39.639ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo
164012025-03-07T23:30:39.639ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164022025-03-07T23:30:39.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164032025-03-07T23:30:39.640ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164042025-03-07T23:30:39.643ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164052025-03-07T23:30:39.643ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164062025-03-07T23:30:39.644ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164072025-03-07T23:30:39.646ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
164082025-03-07T23:30:39.646ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
164092025-03-07T23:30:39.646ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164102025-03-07T23:30:39.646ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164112025-03-07T23:30:39.647ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164122025-03-07T23:30:39.649ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
164132025-03-07T23:30:39.649ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164142025-03-07T23:30:39.649ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164152025-03-07T23:30:39.650ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164162025-03-07T23:30:39.654ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
164172025-03-07T23:30:39.659ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
164182025-03-07T23:30:39.659ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164192025-03-07T23:30:39.659ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164202025-03-07T23:30:39.659ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164212025-03-07T23:30:39.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
164222025-03-07T23:30:39.660ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
164232025-03-07T23:30:39.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164242025-03-07T23:30:39.660ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164252025-03-07T23:30:39.661ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164262025-03-07T23:30:39.664ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
164272025-03-07T23:30:39.664ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
164282025-03-07T23:30:39.664ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
164292025-03-07T23:30:39.664ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
164302025-03-07T23:30:39.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
164312025-03-07T23:30:39.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
164322025-03-07T23:30:39.676ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 uri = /v1/system/silos/demo-silo
164332025-03-07T23:30:39.676ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Database uri = /v1/system/silos/demo-silo
164342025-03-07T23:30:39.676ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
164352025-03-07T23:30:39.676ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
164362025-03-07T23:30:39.679ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
164372025-03-07T23:30:39.679ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo
164382025-03-07T23:30:39.679ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Database uri = /v1/system/silos/demo-silo
164392025-03-07T23:30:39.679ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
164402025-03-07T23:30:39.680ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
164412025-03-07T23:30:39.684ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
164422025-03-07T23:30:39.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Database uri = /v1/system/silos/demo-silo
164432025-03-07T23:30:39.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
164442025-03-07T23:30:39.685ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
164452025-03-07T23:30:39.690ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
164462025-03-07T23:30:39.717ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo
164472025-03-07T23:30:39.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 77836 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d22afaf-a066-4974-b7cd-88403c4aca69 response_code = 404 uri = /v1/system/silos/demo-silo
164482025-03-07T23:30:39.718ZINFOtest_unauthorized (external client test context): client received response status = 404
164492025-03-07T23:30:39.718ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo
164502025-03-07T23:30:39.718ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164512025-03-07T23:30:39.719ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f uri = /v1/system/silos/demo-silo
164522025-03-07T23:30:39.719ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f uri = /v1/system/silos/demo-silo
164532025-03-07T23:30:39.719ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f uri = /v1/system/silos/demo-silo
164542025-03-07T23:30:39.719ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f uri = /v1/system/silos/demo-silo
164552025-03-07T23:30:39.719ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f resource = Database uri = /v1/system/silos/demo-silo
164562025-03-07T23:30:39.719ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
164572025-03-07T23:30:39.719ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo
164582025-03-07T23:30:39.719ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 649 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dba6bed9-e0e4-4f9c-8395-4f322d4e135f response_code = 401 uri = /v1/system/silos/demo-silo
164592025-03-07T23:30:39.719ZINFOtest_unauthorized (external client test context): client received response status = 401
164602025-03-07T23:30:39.719ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo
164612025-03-07T23:30:39.719ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164622025-03-07T23:30:39.724ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 62bb9114-adf8-430a-82bd-a8e816f2349e uri = /v1/system/silos/demo-silo
164632025-03-07T23:30:39.724ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 62bb9114-adf8-430a-82bd-a8e816f2349e uri = /v1/system/silos/demo-silo
164642025-03-07T23:30:39.724ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 62bb9114-adf8-430a-82bd-a8e816f2349e uri = /v1/system/silos/demo-silo
164652025-03-07T23:30:39.724ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 210 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 62bb9114-adf8-430a-82bd-a8e816f2349e response_code = 401 uri = /v1/system/silos/demo-silo
164662025-03-07T23:30:39.724ZINFOtest_unauthorized (external client test context): client received response status = 401
164672025-03-07T23:30:39.724ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo
164682025-03-07T23:30:39.724ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164692025-03-07T23:30:39.724ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e9131665-a8f8-4c7e-aece-0df165378273 uri = /v1/system/silos/demo-silo
164702025-03-07T23:30:39.724ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e9131665-a8f8-4c7e-aece-0df165378273 uri = /v1/system/silos/demo-silo
164712025-03-07T23:30:39.725ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:512:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:523:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e9131665-a8f8-4c7e-aece-0df165378273 uri = /v1/system/silos/demo-silo
164722025-03-07T23:30:39.725ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1171 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e9131665-a8f8-4c7e-aece-0df165378273 response_code = 401 uri = /v1/system/silos/demo-silo
164732025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client received response status = 401
164742025-03-07T23:30:39.725ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo
164752025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164762025-03-07T23:30:39.725ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 20851e8f-1899-4d93-9dd4-079304116317 uri = /v1/system/silos/demo-silo
164772025-03-07T23:30:39.725ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 20851e8f-1899-4d93-9dd4-079304116317 response_code = 405 uri = /v1/system/silos/demo-silo
164782025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client received response status = 405
164792025-03-07T23:30:39.725ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo
164802025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164812025-03-07T23:30:39.725ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 507527b0-805d-4b21-b107-62019e8c45b1 uri = /v1/system/silos/demo-silo
164822025-03-07T23:30:39.725ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 507527b0-805d-4b21-b107-62019e8c45b1 response_code = 405 uri = /v1/system/silos/demo-silo
164832025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client received response status = 405
164842025-03-07T23:30:39.725ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo
164852025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164862025-03-07T23:30:39.725ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8f7cab1b-c04e-463c-8f72-7047dc34bb22 uri = /v1/system/silos/demo-silo
164872025-03-07T23:30:39.725ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8f7cab1b-c04e-463c-8f72-7047dc34bb22 response_code = 405 uri = /v1/system/silos/demo-silo
164882025-03-07T23:30:39.725ZINFOtest_unauthorized (external client test context): client received response status = 405
164892025-03-07T23:30:39.725ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo
164902025-03-07T23:30:39.726ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164912025-03-07T23:30:39.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7480338f-264a-4226-8c3a-d2ff6b24f0e5 uri = /v1/system/silos/demo-silo
164922025-03-07T23:30:39.726ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7480338f-264a-4226-8c3a-d2ff6b24f0e5 response_code = 405 uri = /v1/system/silos/demo-silo
164932025-03-07T23:30:39.726ZINFOtest_unauthorized (external client test context): client received response status = 405
164942025-03-07T23:30:39.726ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo
164952025-03-07T23:30:39.726ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo
164962025-03-07T23:30:39.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 uri = /v1/system/silos/demo-silo
164972025-03-07T23:30:39.726ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 uri = /v1/system/silos/demo-silo
164982025-03-07T23:30:39.726ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo
164992025-03-07T23:30:39.726ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165002025-03-07T23:30:39.726ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165012025-03-07T23:30:39.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165022025-03-07T23:30:39.730ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165032025-03-07T23:30:39.730ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165042025-03-07T23:30:39.731ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165052025-03-07T23:30:39.743ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
165062025-03-07T23:30:39.744ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
165072025-03-07T23:30:39.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165082025-03-07T23:30:39.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165092025-03-07T23:30:39.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165102025-03-07T23:30:39.747ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
165112025-03-07T23:30:39.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165122025-03-07T23:30:39.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165132025-03-07T23:30:39.750ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165142025-03-07T23:30:39.767ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
165152025-03-07T23:30:39.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
165162025-03-07T23:30:39.772ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165172025-03-07T23:30:39.772ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165182025-03-07T23:30:39.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165192025-03-07T23:30:39.777ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
165202025-03-07T23:30:39.777ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
165212025-03-07T23:30:39.777ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165222025-03-07T23:30:39.777ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165232025-03-07T23:30:39.778ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165242025-03-07T23:30:39.785ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
165252025-03-07T23:30:39.785ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165262025-03-07T23:30:39.785ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165272025-03-07T23:30:39.787ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165282025-03-07T23:30:39.797ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
165292025-03-07T23:30:39.800ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
165302025-03-07T23:30:39.801ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 uri = /v1/system/silos/demo-silo
165312025-03-07T23:30:39.801ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Database uri = /v1/system/silos/demo-silo
165322025-03-07T23:30:39.801ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
165332025-03-07T23:30:39.802ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
165342025-03-07T23:30:39.809ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo
165352025-03-07T23:30:39.809ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo
165362025-03-07T23:30:39.809ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Database uri = /v1/system/silos/demo-silo
165372025-03-07T23:30:39.809ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
165382025-03-07T23:30:39.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
165392025-03-07T23:30:39.819ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
165402025-03-07T23:30:39.819ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
165412025-03-07T23:30:39.819ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
165422025-03-07T23:30:39.819ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
165432025-03-07T23:30:39.819ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
165442025-03-07T23:30:39.819ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
165452025-03-07T23:30:39.830ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo
165462025-03-07T23:30:39.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Database uri = /v1/system/silos/demo-silo
165472025-03-07T23:30:39.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo
165482025-03-07T23:30:39.831ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo
165492025-03-07T23:30:39.838ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo
165502025-03-07T23:30:39.850ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo
165512025-03-07T23:30:39.851ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 126803 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd5f8fa7-aa83-4ab0-b72c-1af4fa0fe286 response_code = 200 uri = /v1/system/silos/demo-silo
165522025-03-07T23:30:39.851ZINFOtest_unauthorized (external client test context): client received response status = 200
165532025-03-07T23:30:39.851ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo/ip-pools
165542025-03-07T23:30:39.851ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo/ip-pools
165552025-03-07T23:30:39.852ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
165562025-03-07T23:30:39.852ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff uri = /v1/system/silos/demo-silo/ip-pools
165572025-03-07T23:30:39.852ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff uri = /v1/system/silos/demo-silo/ip-pools
165582025-03-07T23:30:39.852ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/ip-pools
165592025-03-07T23:30:39.853ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165602025-03-07T23:30:39.853ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165612025-03-07T23:30:39.855ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165622025-03-07T23:30:39.858ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165632025-03-07T23:30:39.858ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165642025-03-07T23:30:39.859ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165652025-03-07T23:30:39.861ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
165662025-03-07T23:30:39.861ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
165672025-03-07T23:30:39.862ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165682025-03-07T23:30:39.862ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165692025-03-07T23:30:39.862ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165702025-03-07T23:30:39.865ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
165712025-03-07T23:30:39.865ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165722025-03-07T23:30:39.865ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165732025-03-07T23:30:39.865ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165742025-03-07T23:30:39.871ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
165752025-03-07T23:30:39.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
165762025-03-07T23:30:39.880ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165772025-03-07T23:30:39.880ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165782025-03-07T23:30:39.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165792025-03-07T23:30:39.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
165802025-03-07T23:30:39.885ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
165812025-03-07T23:30:39.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165822025-03-07T23:30:39.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165832025-03-07T23:30:39.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165842025-03-07T23:30:39.891ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
165852025-03-07T23:30:39.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
165862025-03-07T23:30:39.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
165872025-03-07T23:30:39.893ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
165882025-03-07T23:30:39.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
165892025-03-07T23:30:39.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
165902025-03-07T23:30:39.904ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff uri = /v1/system/silos/demo-silo/ip-pools
165912025-03-07T23:30:39.904ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database uri = /v1/system/silos/demo-silo/ip-pools
165922025-03-07T23:30:39.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
165932025-03-07T23:30:39.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
165942025-03-07T23:30:39.918ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/ip-pools
165952025-03-07T23:30:39.918ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/ip-pools
165962025-03-07T23:30:39.918ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database uri = /v1/system/silos/demo-silo/ip-pools
165972025-03-07T23:30:39.918ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
165982025-03-07T23:30:39.919ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
165992025-03-07T23:30:39.930ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
166002025-03-07T23:30:39.930ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166012025-03-07T23:30:39.930ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166022025-03-07T23:30:39.931ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166032025-03-07T23:30:39.938ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
166042025-03-07T23:30:39.953ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166052025-03-07T23:30:39.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = IpPoolList uri = /v1/system/silos/demo-silo/ip-pools
166062025-03-07T23:30:39.953ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
166072025-03-07T23:30:39.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166082025-03-07T23:30:39.953ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166092025-03-07T23:30:39.954ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166102025-03-07T23:30:39.958ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
166112025-03-07T23:30:39.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = IpPoolList result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166122025-03-07T23:30:39.967ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166132025-03-07T23:30:39.968ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166142025-03-07T23:30:39.968ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166152025-03-07T23:30:39.977ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 125047 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 992c01ec-9fb6-4989-93b3-2aacca5a66ff response_code = 200 uri = /v1/system/silos/demo-silo/ip-pools
166162025-03-07T23:30:39.978ZINFOtest_unauthorized (external client test context): client received response status = 200
166172025-03-07T23:30:39.978ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo/ip-pools
166182025-03-07T23:30:39.978ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
166192025-03-07T23:30:39.979ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 uri = /v1/system/silos/demo-silo/ip-pools
166202025-03-07T23:30:39.979ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 uri = /v1/system/silos/demo-silo/ip-pools
166212025-03-07T23:30:39.979ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/ip-pools
166222025-03-07T23:30:39.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166232025-03-07T23:30:39.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166242025-03-07T23:30:39.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166252025-03-07T23:30:39.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166262025-03-07T23:30:39.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166272025-03-07T23:30:39.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166282025-03-07T23:30:39.989ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
166292025-03-07T23:30:39.989ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
166302025-03-07T23:30:39.989ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166312025-03-07T23:30:39.989ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166322025-03-07T23:30:39.989ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166332025-03-07T23:30:39.991ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
166342025-03-07T23:30:39.991ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166352025-03-07T23:30:39.991ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166362025-03-07T23:30:39.992ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166372025-03-07T23:30:39.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
166382025-03-07T23:30:39.999ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
166392025-03-07T23:30:39.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166402025-03-07T23:30:39.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166412025-03-07T23:30:40.001ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166422025-03-07T23:30:40.005ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
166432025-03-07T23:30:40.006ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
166442025-03-07T23:30:40.006ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166452025-03-07T23:30:40.006ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166462025-03-07T23:30:40.006ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166472025-03-07T23:30:40.008ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
166482025-03-07T23:30:40.008ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
166492025-03-07T23:30:40.008ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
166502025-03-07T23:30:40.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
166512025-03-07T23:30:40.011ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
166522025-03-07T23:30:40.019ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
166532025-03-07T23:30:40.019ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 uri = /v1/system/silos/demo-silo/ip-pools
166542025-03-07T23:30:40.019ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166552025-03-07T23:30:40.019ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166562025-03-07T23:30:40.021ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166572025-03-07T23:30:40.027ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/ip-pools
166582025-03-07T23:30:40.028ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/ip-pools
166592025-03-07T23:30:40.028ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166602025-03-07T23:30:40.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166612025-03-07T23:30:40.029ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166622025-03-07T23:30:40.033ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
166632025-03-07T23:30:40.033ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166642025-03-07T23:30:40.033ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166652025-03-07T23:30:40.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
166662025-03-07T23:30:40.036ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166672025-03-07T23:30:40.051ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/ip-pools
166682025-03-07T23:30:40.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 72377 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77ac98ac-43c7-44da-be67-afb4cc7a20c2 response_code = 404 uri = /v1/system/silos/demo-silo/ip-pools
166692025-03-07T23:30:40.051ZINFOtest_unauthorized (external client test context): client received response status = 404
166702025-03-07T23:30:40.052ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo/ip-pools
166712025-03-07T23:30:40.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
166722025-03-07T23:30:40.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f uri = /v1/system/silos/demo-silo/ip-pools
166732025-03-07T23:30:40.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f uri = /v1/system/silos/demo-silo/ip-pools
166742025-03-07T23:30:40.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f uri = /v1/system/silos/demo-silo/ip-pools
166752025-03-07T23:30:40.052ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f uri = /v1/system/silos/demo-silo/ip-pools
166762025-03-07T23:30:40.052ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f resource = Database uri = /v1/system/silos/demo-silo/ip-pools
166772025-03-07T23:30:40.052ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
166782025-03-07T23:30:40.053ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/ip-pools
166792025-03-07T23:30:40.053ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1235 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50343e3c-c231-4ffb-a355-228da9374f0f response_code = 401 uri = /v1/system/silos/demo-silo/ip-pools
166802025-03-07T23:30:40.058ZINFOtest_unauthorized (external client test context): client received response status = 401
166812025-03-07T23:30:40.058ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo/ip-pools
166822025-03-07T23:30:40.058ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
166832025-03-07T23:30:40.058ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ef3d699-7162-4d5d-8d7a-5279d596d3d2 uri = /v1/system/silos/demo-silo/ip-pools
166842025-03-07T23:30:40.059ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ef3d699-7162-4d5d-8d7a-5279d596d3d2 uri = /v1/system/silos/demo-silo/ip-pools
166852025-03-07T23:30:40.059ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ef3d699-7162-4d5d-8d7a-5279d596d3d2 uri = /v1/system/silos/demo-silo/ip-pools
166862025-03-07T23:30:40.059ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 274 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ef3d699-7162-4d5d-8d7a-5279d596d3d2 response_code = 401 uri = /v1/system/silos/demo-silo/ip-pools
166872025-03-07T23:30:40.059ZINFOtest_unauthorized (external client test context): client received response status = 401
166882025-03-07T23:30:40.059ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo/ip-pools
166892025-03-07T23:30:40.059ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
166902025-03-07T23:30:40.059ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc9c408-d0cd-44e2-84b0-7c33fc8dbfd2 uri = /v1/system/silos/demo-silo/ip-pools
166912025-03-07T23:30:40.059ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc9c408-d0cd-44e2-84b0-7c33fc8dbfd2 uri = /v1/system/silos/demo-silo/ip-pools
166922025-03-07T23:30:40.061ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:472:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:502:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_ip_pool_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloIpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc9c408-d0cd-44e2-84b0-7c33fc8dbfd2 uri = /v1/system/silos/demo-silo/ip-pools
166932025-03-07T23:30:40.061ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1367 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc9c408-d0cd-44e2-84b0-7c33fc8dbfd2 response_code = 401 uri = /v1/system/silos/demo-silo/ip-pools
166942025-03-07T23:30:40.061ZINFOtest_unauthorized (external client test context): client received response status = 401
166952025-03-07T23:30:40.061ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo/ip-pools
166962025-03-07T23:30:40.061ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
166972025-03-07T23:30:40.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 40a964c9-51d3-4b5c-a6b1-05a499a35f81 uri = /v1/system/silos/demo-silo/ip-pools
166982025-03-07T23:30:40.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 40a964c9-51d3-4b5c-a6b1-05a499a35f81 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
166992025-03-07T23:30:40.062ZINFOtest_unauthorized (external client test context): client received response status = 405
167002025-03-07T23:30:40.062ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo/ip-pools
167012025-03-07T23:30:40.062ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167022025-03-07T23:30:40.062ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 018ad7d2-c286-41c8-8a7f-e1845e4d7f10 uri = /v1/system/silos/demo-silo/ip-pools
167032025-03-07T23:30:40.062ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 018ad7d2-c286-41c8-8a7f-e1845e4d7f10 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167042025-03-07T23:30:40.062ZINFOtest_unauthorized (external client test context): client received response status = 405
167052025-03-07T23:30:40.062ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo/ip-pools
167062025-03-07T23:30:40.063ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167072025-03-07T23:30:40.063ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8a005486-bc5e-481e-aa74-2e37b9215b06 uri = /v1/system/silos/demo-silo/ip-pools
167082025-03-07T23:30:40.063ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 94 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8a005486-bc5e-481e-aa74-2e37b9215b06 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167092025-03-07T23:30:40.063ZINFOtest_unauthorized (external client test context): client received response status = 405
167102025-03-07T23:30:40.063ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo/ip-pools
167112025-03-07T23:30:40.063ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167122025-03-07T23:30:40.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0905fb5b-017a-490b-9288-03a8eefae030 uri = /v1/system/silos/demo-silo/ip-pools
167132025-03-07T23:30:40.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0905fb5b-017a-490b-9288-03a8eefae030 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167142025-03-07T23:30:40.064ZINFOtest_unauthorized (external client test context): client received response status = 405
167152025-03-07T23:30:40.064ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo/ip-pools
167162025-03-07T23:30:40.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167172025-03-07T23:30:40.065ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6cef461-6d5d-4acc-9a2e-3f60045c026d uri = /v1/system/silos/demo-silo/ip-pools
167182025-03-07T23:30:40.065ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6cef461-6d5d-4acc-9a2e-3f60045c026d response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167192025-03-07T23:30:40.065ZINFOtest_unauthorized (external client test context): client received response status = 405
167202025-03-07T23:30:40.065ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo/ip-pools
167212025-03-07T23:30:40.065ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167222025-03-07T23:30:40.065ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c92a33-4444-41ce-9e72-4a58b75617ba uri = /v1/system/silos/demo-silo/ip-pools
167232025-03-07T23:30:40.065ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6c92a33-4444-41ce-9e72-4a58b75617ba response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167242025-03-07T23:30:40.065ZINFOtest_unauthorized (external client test context): client received response status = 405
167252025-03-07T23:30:40.066ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo/ip-pools
167262025-03-07T23:30:40.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167272025-03-07T23:30:40.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1b3a2250-926e-4de9-859f-1447a96dc1f8 uri = /v1/system/silos/demo-silo/ip-pools
167282025-03-07T23:30:40.066ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1b3a2250-926e-4de9-859f-1447a96dc1f8 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167292025-03-07T23:30:40.066ZINFOtest_unauthorized (external client test context): client received response status = 405
167302025-03-07T23:30:40.067ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo/ip-pools
167312025-03-07T23:30:40.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167322025-03-07T23:30:40.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16bd4eb6-dd71-47a0-b766-79b2e9363a01 uri = /v1/system/silos/demo-silo/ip-pools
167332025-03-07T23:30:40.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 106 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16bd4eb6-dd71-47a0-b766-79b2e9363a01 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167342025-03-07T23:30:40.067ZINFOtest_unauthorized (external client test context): client received response status = 405
167352025-03-07T23:30:40.067ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo/ip-pools
167362025-03-07T23:30:40.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167372025-03-07T23:30:40.068ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ca2d632f-9bec-47d0-a9a5-c356233de013 uri = /v1/system/silos/demo-silo/ip-pools
167382025-03-07T23:30:40.068ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ca2d632f-9bec-47d0-a9a5-c356233de013 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167392025-03-07T23:30:40.068ZINFOtest_unauthorized (external client test context): client received response status = 405
167402025-03-07T23:30:40.068ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo/ip-pools
167412025-03-07T23:30:40.068ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167422025-03-07T23:30:40.068ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4034b0d2-cb07-4ad2-b7fc-cee6260a578a uri = /v1/system/silos/demo-silo/ip-pools
167432025-03-07T23:30:40.069ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4034b0d2-cb07-4ad2-b7fc-cee6260a578a response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167442025-03-07T23:30:40.069ZINFOtest_unauthorized (external client test context): client received response status = 405
167452025-03-07T23:30:40.069ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo/ip-pools
167462025-03-07T23:30:40.069ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167472025-03-07T23:30:40.070ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 462dda2d-120c-428f-8a53-a3173c9f72a1 uri = /v1/system/silos/demo-silo/ip-pools
167482025-03-07T23:30:40.070ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 217 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 462dda2d-120c-428f-8a53-a3173c9f72a1 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167492025-03-07T23:30:40.071ZINFOtest_unauthorized (external client test context): client received response status = 405
167502025-03-07T23:30:40.071ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo/ip-pools
167512025-03-07T23:30:40.071ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167522025-03-07T23:30:40.074ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 268d19af-9cad-4509-a87f-584141cee164 uri = /v1/system/silos/demo-silo/ip-pools
167532025-03-07T23:30:40.074ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 268d19af-9cad-4509-a87f-584141cee164 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167542025-03-07T23:30:40.074ZINFOtest_unauthorized (external client test context): client received response status = 405
167552025-03-07T23:30:40.074ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo/ip-pools
167562025-03-07T23:30:40.074ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167572025-03-07T23:30:40.074ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 73bfc526-8279-45fe-94ab-6b2eeeedf7b1 uri = /v1/system/silos/demo-silo/ip-pools
167582025-03-07T23:30:40.074ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 73bfc526-8279-45fe-94ab-6b2eeeedf7b1 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167592025-03-07T23:30:40.074ZINFOtest_unauthorized (external client test context): client received response status = 405
167602025-03-07T23:30:40.074ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo/ip-pools
167612025-03-07T23:30:40.074ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167622025-03-07T23:30:40.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a6dd954b-a388-423e-92b8-d21cd7b41c39 uri = /v1/system/silos/demo-silo/ip-pools
167632025-03-07T23:30:40.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 103 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a6dd954b-a388-423e-92b8-d21cd7b41c39 response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167642025-03-07T23:30:40.075ZINFOtest_unauthorized (external client test context): client received response status = 405
167652025-03-07T23:30:40.076ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo/ip-pools
167662025-03-07T23:30:40.076ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167672025-03-07T23:30:40.076ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 53df5ca7-3260-4761-99dc-b601fe2a410e uri = /v1/system/silos/demo-silo/ip-pools
167682025-03-07T23:30:40.076ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 53df5ca7-3260-4761-99dc-b601fe2a410e response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167692025-03-07T23:30:40.076ZINFOtest_unauthorized (external client test context): client received response status = 405
167702025-03-07T23:30:40.076ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo/ip-pools
167712025-03-07T23:30:40.077ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167722025-03-07T23:30:40.077ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d2969435-19a4-4c49-9f63-76a99a3ac4cf uri = /v1/system/silos/demo-silo/ip-pools
167732025-03-07T23:30:40.077ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d2969435-19a4-4c49-9f63-76a99a3ac4cf response_code = 405 uri = /v1/system/silos/demo-silo/ip-pools
167742025-03-07T23:30:40.077ZINFOtest_unauthorized (external client test context): client received response status = 405
167752025-03-07T23:30:40.077ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo/ip-pools
167762025-03-07T23:30:40.077ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/ip-pools
167772025-03-07T23:30:40.077ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce uri = /v1/system/silos/demo-silo/ip-pools
167782025-03-07T23:30:40.078ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce uri = /v1/system/silos/demo-silo/ip-pools
167792025-03-07T23:30:40.078ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/ip-pools
167802025-03-07T23:30:40.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167812025-03-07T23:30:40.078ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167822025-03-07T23:30:40.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167832025-03-07T23:30:40.082ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167842025-03-07T23:30:40.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167852025-03-07T23:30:40.087ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167862025-03-07T23:30:40.093ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
167872025-03-07T23:30:40.093ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
167882025-03-07T23:30:40.093ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167892025-03-07T23:30:40.093ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167902025-03-07T23:30:40.094ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167912025-03-07T23:30:40.097ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
167922025-03-07T23:30:40.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167932025-03-07T23:30:40.097ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167942025-03-07T23:30:40.099ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
167952025-03-07T23:30:40.101ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
167962025-03-07T23:30:40.110ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
167972025-03-07T23:30:40.110ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
167982025-03-07T23:30:40.110ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
167992025-03-07T23:30:40.112ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168002025-03-07T23:30:40.115ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
168012025-03-07T23:30:40.115ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
168022025-03-07T23:30:40.115ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168032025-03-07T23:30:40.115ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168042025-03-07T23:30:40.116ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168052025-03-07T23:30:40.119ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
168062025-03-07T23:30:40.119ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168072025-03-07T23:30:40.119ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168082025-03-07T23:30:40.120ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168092025-03-07T23:30:40.121ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
168102025-03-07T23:30:40.124ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
168112025-03-07T23:30:40.124ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce uri = /v1/system/silos/demo-silo/ip-pools
168122025-03-07T23:30:40.124ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database uri = /v1/system/silos/demo-silo/ip-pools
168132025-03-07T23:30:40.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
168142025-03-07T23:30:40.125ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168152025-03-07T23:30:40.127ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/ip-pools
168162025-03-07T23:30:40.127ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/ip-pools
168172025-03-07T23:30:40.127ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database uri = /v1/system/silos/demo-silo/ip-pools
168182025-03-07T23:30:40.127ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
168192025-03-07T23:30:40.127ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168202025-03-07T23:30:40.130ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
168212025-03-07T23:30:40.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database uri = /v1/system/silos/demo-silo/ip-pools
168222025-03-07T23:30:40.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
168232025-03-07T23:30:40.131ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168242025-03-07T23:30:40.135ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
168252025-03-07T23:30:40.146ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168262025-03-07T23:30:40.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = IpPoolList uri = /v1/system/silos/demo-silo/ip-pools
168272025-03-07T23:30:40.146ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/ip-pools
168282025-03-07T23:30:40.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database uri = /v1/system/silos/demo-silo/ip-pools
168292025-03-07T23:30:40.146ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
168302025-03-07T23:30:40.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168312025-03-07T23:30:40.152ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/ip-pools
168322025-03-07T23:30:40.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = IpPoolList result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168332025-03-07T23:30:40.170ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database uri = /v1/system/silos/demo-silo/ip-pools
168342025-03-07T23:30:40.170ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/ip-pools
168352025-03-07T23:30:40.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/ip-pools
168362025-03-07T23:30:40.171ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
168372025-03-07T23:30:40.171ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
168382025-03-07T23:30:40.171ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
168392025-03-07T23:30:40.172ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
168402025-03-07T23:30:40.180ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 102534 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e143d248-e824-4904-891c-d02686fec6ce response_code = 200 uri = /v1/system/silos/demo-silo/ip-pools
168412025-03-07T23:30:40.181ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
168422025-03-07T23:30:40.181ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
168432025-03-07T23:30:40.183ZINFOtest_unauthorized (external client test context): client received response status = 200
168442025-03-07T23:30:40.183ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo/policy
168452025-03-07T23:30:40.183ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo/policy
168462025-03-07T23:30:40.184ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
168472025-03-07T23:30:40.186ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
168482025-03-07T23:30:40.186ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
168492025-03-07T23:30:40.187ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 uri = /v1/system/silos/demo-silo/policy
168502025-03-07T23:30:40.187ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 uri = /v1/system/silos/demo-silo/policy
168512025-03-07T23:30:40.187ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/policy
168522025-03-07T23:30:40.187ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168532025-03-07T23:30:40.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168542025-03-07T23:30:40.189ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168552025-03-07T23:30:40.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168562025-03-07T23:30:40.208ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168572025-03-07T23:30:40.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168582025-03-07T23:30:40.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
168592025-03-07T23:30:40.248ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
168602025-03-07T23:30:40.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168612025-03-07T23:30:40.248ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168622025-03-07T23:30:40.251ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168632025-03-07T23:30:40.256ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
168642025-03-07T23:30:40.256ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168652025-03-07T23:30:40.256ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168662025-03-07T23:30:40.257ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168672025-03-07T23:30:40.260ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
168682025-03-07T23:30:40.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
168692025-03-07T23:30:40.286ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168702025-03-07T23:30:40.286ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168712025-03-07T23:30:40.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168722025-03-07T23:30:40.291ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
168732025-03-07T23:30:40.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
168742025-03-07T23:30:40.294ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
168752025-03-07T23:30:40.294ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168762025-03-07T23:30:40.294ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168772025-03-07T23:30:40.294ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168782025-03-07T23:30:40.297ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
168792025-03-07T23:30:40.298ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
168802025-03-07T23:30:40.298ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
168812025-03-07T23:30:40.298ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
168822025-03-07T23:30:40.302ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
168832025-03-07T23:30:40.307ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
168842025-03-07T23:30:40.308ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 uri = /v1/system/silos/demo-silo/policy
168852025-03-07T23:30:40.308ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database uri = /v1/system/silos/demo-silo/policy
168862025-03-07T23:30:40.308ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168872025-03-07T23:30:40.308ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168882025-03-07T23:30:40.321ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
168892025-03-07T23:30:40.322ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
168902025-03-07T23:30:40.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database uri = /v1/system/silos/demo-silo/policy
168912025-03-07T23:30:40.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168922025-03-07T23:30:40.322ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168932025-03-07T23:30:40.326ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
168942025-03-07T23:30:40.326ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database uri = /v1/system/silos/demo-silo/policy
168952025-03-07T23:30:40.326ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
168962025-03-07T23:30:40.327ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168972025-03-07T23:30:40.332ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
168982025-03-07T23:30:40.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
168992025-03-07T23:30:40.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database uri = /v1/system/silos/demo-silo/policy
169002025-03-07T23:30:40.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169012025-03-07T23:30:40.348ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169022025-03-07T23:30:40.350ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
169032025-03-07T23:30:40.351ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
169042025-03-07T23:30:40.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database uri = /v1/system/silos/demo-silo/policy
169052025-03-07T23:30:40.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169062025-03-07T23:30:40.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169072025-03-07T23:30:40.355ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
169082025-03-07T23:30:40.355ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database uri = /v1/system/silos/demo-silo/policy
169092025-03-07T23:30:40.355ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169102025-03-07T23:30:40.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169112025-03-07T23:30:40.359ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
169122025-03-07T23:30:40.375ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169132025-03-07T23:30:40.389ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 202491 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = af09c2bb-9671-460d-85a1-168989c7ddd1 response_code = 200 uri = /v1/system/silos/demo-silo/policy
169142025-03-07T23:30:40.389ZINFOtest_unauthorized (external client test context): client received response status = 200
169152025-03-07T23:30:40.390ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo/policy
169162025-03-07T23:30:40.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
169172025-03-07T23:30:40.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 uri = /v1/system/silos/demo-silo/policy
169182025-03-07T23:30:40.390ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 uri = /v1/system/silos/demo-silo/policy
169192025-03-07T23:30:40.390ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/policy
169202025-03-07T23:30:40.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169212025-03-07T23:30:40.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169222025-03-07T23:30:40.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169232025-03-07T23:30:40.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169242025-03-07T23:30:40.394ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169252025-03-07T23:30:40.394ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169262025-03-07T23:30:40.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
169272025-03-07T23:30:40.396ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
169282025-03-07T23:30:40.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169292025-03-07T23:30:40.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169302025-03-07T23:30:40.397ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169312025-03-07T23:30:40.402ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
169322025-03-07T23:30:40.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169332025-03-07T23:30:40.402ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169342025-03-07T23:30:40.402ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169352025-03-07T23:30:40.405ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
169362025-03-07T23:30:40.409ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
169372025-03-07T23:30:40.409ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169382025-03-07T23:30:40.410ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169392025-03-07T23:30:40.410ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169402025-03-07T23:30:40.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
169412025-03-07T23:30:40.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
169422025-03-07T23:30:40.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169432025-03-07T23:30:40.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169442025-03-07T23:30:40.413ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169452025-03-07T23:30:40.415ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
169462025-03-07T23:30:40.415ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169472025-03-07T23:30:40.415ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
169482025-03-07T23:30:40.417ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
169492025-03-07T23:30:40.420ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
169502025-03-07T23:30:40.423ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
169512025-03-07T23:30:40.423ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 uri = /v1/system/silos/demo-silo/policy
169522025-03-07T23:30:40.423ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Database uri = /v1/system/silos/demo-silo/policy
169532025-03-07T23:30:40.423ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169542025-03-07T23:30:40.424ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169552025-03-07T23:30:40.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
169562025-03-07T23:30:40.486ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
169572025-03-07T23:30:40.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Database uri = /v1/system/silos/demo-silo/policy
169582025-03-07T23:30:40.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169592025-03-07T23:30:40.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169602025-03-07T23:30:40.497ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
169612025-03-07T23:30:40.497ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Database uri = /v1/system/silos/demo-silo/policy
169622025-03-07T23:30:40.497ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169632025-03-07T23:30:40.498ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
169642025-03-07T23:30:40.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169652025-03-07T23:30:40.547ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/policy
169662025-03-07T23:30:40.547ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 156982 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cb0da33-fc23-4663-8c51-5f7c23d2c506 response_code = 404 uri = /v1/system/silos/demo-silo/policy
169672025-03-07T23:30:40.547ZINFOtest_unauthorized (external client test context): client received response status = 404
169682025-03-07T23:30:40.548ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo/policy
169692025-03-07T23:30:40.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
169702025-03-07T23:30:40.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 uri = /v1/system/silos/demo-silo/policy
169712025-03-07T23:30:40.549ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 uri = /v1/system/silos/demo-silo/policy
169722025-03-07T23:30:40.549ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 uri = /v1/system/silos/demo-silo/policy
169732025-03-07T23:30:40.549ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 uri = /v1/system/silos/demo-silo/policy
169742025-03-07T23:30:40.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 resource = Database uri = /v1/system/silos/demo-silo/policy
169752025-03-07T23:30:40.549ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
169762025-03-07T23:30:40.550ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/policy
169772025-03-07T23:30:40.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 999 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05f9e377-d68d-4b82-8cae-067797eafc73 response_code = 401 uri = /v1/system/silos/demo-silo/policy
169782025-03-07T23:30:40.550ZINFOtest_unauthorized (external client test context): client received response status = 401
169792025-03-07T23:30:40.550ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo/policy
169802025-03-07T23:30:40.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
169812025-03-07T23:30:40.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 60746155-3902-4a3e-9352-59b06fc5b7a5 uri = /v1/system/silos/demo-silo/policy
169822025-03-07T23:30:40.550ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 60746155-3902-4a3e-9352-59b06fc5b7a5 uri = /v1/system/silos/demo-silo/policy
169832025-03-07T23:30:40.550ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 60746155-3902-4a3e-9352-59b06fc5b7a5 uri = /v1/system/silos/demo-silo/policy
169842025-03-07T23:30:40.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 277 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 60746155-3902-4a3e-9352-59b06fc5b7a5 response_code = 401 uri = /v1/system/silos/demo-silo/policy
169852025-03-07T23:30:40.551ZINFOtest_unauthorized (external client test context): client received response status = 401
169862025-03-07T23:30:40.551ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo/policy
169872025-03-07T23:30:40.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
169882025-03-07T23:30:40.551ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a613c683-5a7c-4f03-8d33-17764fa01f3b uri = /v1/system/silos/demo-silo/policy
169892025-03-07T23:30:40.551ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a613c683-5a7c-4f03-8d33-17764fa01f3b uri = /v1/system/silos/demo-silo/policy
169902025-03-07T23:30:40.553ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:534:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:545:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a613c683-5a7c-4f03-8d33-17764fa01f3b uri = /v1/system/silos/demo-silo/policy
169912025-03-07T23:30:40.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1895 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a613c683-5a7c-4f03-8d33-17764fa01f3b response_code = 401 uri = /v1/system/silos/demo-silo/policy
169922025-03-07T23:30:40.554ZINFOtest_unauthorized (external client test context): client received response status = 401
169932025-03-07T23:30:40.554ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo/policy
169942025-03-07T23:30:40.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
169952025-03-07T23:30:40.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e uri = /v1/system/silos/demo-silo/policy
169962025-03-07T23:30:40.556ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e uri = /v1/system/silos/demo-silo/policy
169972025-03-07T23:30:40.557ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/policy
169982025-03-07T23:30:40.557ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
169992025-03-07T23:30:40.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170002025-03-07T23:30:40.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170012025-03-07T23:30:40.566ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
170022025-03-07T23:30:40.574ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
170032025-03-07T23:30:40.580ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170042025-03-07T23:30:40.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170052025-03-07T23:30:40.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170062025-03-07T23:30:40.581ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
170072025-03-07T23:30:40.582ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
170082025-03-07T23:30:40.582ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
170092025-03-07T23:30:40.582ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
170102025-03-07T23:30:40.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
170112025-03-07T23:30:40.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
170122025-03-07T23:30:40.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170132025-03-07T23:30:40.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170142025-03-07T23:30:40.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170152025-03-07T23:30:40.589ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
170162025-03-07T23:30:40.589ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170172025-03-07T23:30:40.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170182025-03-07T23:30:40.590ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170192025-03-07T23:30:40.600ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
170202025-03-07T23:30:40.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
170212025-03-07T23:30:40.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170222025-03-07T23:30:40.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170232025-03-07T23:30:40.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170242025-03-07T23:30:40.607ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
170252025-03-07T23:30:40.607ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
170262025-03-07T23:30:40.607ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170272025-03-07T23:30:40.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170282025-03-07T23:30:40.608ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170292025-03-07T23:30:40.610ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
170302025-03-07T23:30:40.610ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
170312025-03-07T23:30:40.610ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
170322025-03-07T23:30:40.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
170332025-03-07T23:30:40.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
170342025-03-07T23:30:40.621ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
170352025-03-07T23:30:40.621ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e uri = /v1/system/silos/demo-silo/policy
170362025-03-07T23:30:40.621ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Database uri = /v1/system/silos/demo-silo/policy
170372025-03-07T23:30:40.622ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170382025-03-07T23:30:40.622ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170392025-03-07T23:30:40.627ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
170402025-03-07T23:30:40.627ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
170412025-03-07T23:30:40.627ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Database uri = /v1/system/silos/demo-silo/policy
170422025-03-07T23:30:40.627ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170432025-03-07T23:30:40.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170442025-03-07T23:30:40.635ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
170452025-03-07T23:30:40.636ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Database uri = /v1/system/silos/demo-silo/policy
170462025-03-07T23:30:40.636ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170472025-03-07T23:30:40.636ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
170482025-03-07T23:30:40.651ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170492025-03-07T23:30:40.685ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/policy
170502025-03-07T23:30:40.685ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 130275 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c4051be0-56e1-4fc7-893f-13cf68b1e61e response_code = 404 uri = /v1/system/silos/demo-silo/policy
170512025-03-07T23:30:40.686ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
170522025-03-07T23:30:40.686ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
170532025-03-07T23:30:40.686ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
170542025-03-07T23:30:40.686ZINFOtest_unauthorized (external client test context): client received response status = 404
170552025-03-07T23:30:40.686ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo/policy
170562025-03-07T23:30:40.686ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170572025-03-07T23:30:40.687ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 uri = /v1/system/silos/demo-silo/policy
170582025-03-07T23:30:40.687ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 uri = /v1/system/silos/demo-silo/policy
170592025-03-07T23:30:40.687ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 uri = /v1/system/silos/demo-silo/policy
170602025-03-07T23:30:40.687ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 uri = /v1/system/silos/demo-silo/policy
170612025-03-07T23:30:40.687ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 resource = Database uri = /v1/system/silos/demo-silo/policy
170622025-03-07T23:30:40.687ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
170632025-03-07T23:30:40.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/policy
170642025-03-07T23:30:40.687ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 819 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c52f69d2-d760-461e-aad8-198b563cb8f9 response_code = 401 uri = /v1/system/silos/demo-silo/policy
170652025-03-07T23:30:40.688ZINFOtest_unauthorized (external client test context): client received response status = 401
170662025-03-07T23:30:40.688ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo/policy
170672025-03-07T23:30:40.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170682025-03-07T23:30:40.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6884de0-40ff-4c7a-bb90-98bfe1f12899 uri = /v1/system/silos/demo-silo/policy
170692025-03-07T23:30:40.688ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6884de0-40ff-4c7a-bb90-98bfe1f12899 uri = /v1/system/silos/demo-silo/policy
170702025-03-07T23:30:40.688ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6884de0-40ff-4c7a-bb90-98bfe1f12899 uri = /v1/system/silos/demo-silo/policy
170712025-03-07T23:30:40.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 299 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6884de0-40ff-4c7a-bb90-98bfe1f12899 response_code = 401 uri = /v1/system/silos/demo-silo/policy
170722025-03-07T23:30:40.688ZINFOtest_unauthorized (external client test context): client received response status = 401
170732025-03-07T23:30:40.688ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo/policy
170742025-03-07T23:30:40.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170752025-03-07T23:30:40.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ba826caf-067b-4434-8099-65997a7faf95 uri = /v1/system/silos/demo-silo/policy
170762025-03-07T23:30:40.689ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ba826caf-067b-4434-8099-65997a7faf95 uri = /v1/system/silos/demo-silo/policy
170772025-03-07T23:30:40.690ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:561:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:574:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_policy_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ba826caf-067b-4434-8099-65997a7faf95 uri = /v1/system/silos/demo-silo/policy
170782025-03-07T23:30:40.690ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1083 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ba826caf-067b-4434-8099-65997a7faf95 response_code = 401 uri = /v1/system/silos/demo-silo/policy
170792025-03-07T23:30:40.690ZINFOtest_unauthorized (external client test context): client received response status = 401
170802025-03-07T23:30:40.690ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo/policy
170812025-03-07T23:30:40.690ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170822025-03-07T23:30:40.690ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32c9005d-8bc9-4918-8dc3-c744f2dda17a uri = /v1/system/silos/demo-silo/policy
170832025-03-07T23:30:40.690ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32c9005d-8bc9-4918-8dc3-c744f2dda17a response_code = 405 uri = /v1/system/silos/demo-silo/policy
170842025-03-07T23:30:40.690ZINFOtest_unauthorized (external client test context): client received response status = 405
170852025-03-07T23:30:40.691ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo/policy
170862025-03-07T23:30:40.691ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170872025-03-07T23:30:40.691ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2bad5596-4da4-45ac-9383-e3c55e951ee6 uri = /v1/system/silos/demo-silo/policy
170882025-03-07T23:30:40.691ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2bad5596-4da4-45ac-9383-e3c55e951ee6 response_code = 405 uri = /v1/system/silos/demo-silo/policy
170892025-03-07T23:30:40.691ZINFOtest_unauthorized (external client test context): client received response status = 405
170902025-03-07T23:30:40.691ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo/policy
170912025-03-07T23:30:40.691ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170922025-03-07T23:30:40.691ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dd89ce53-4800-4d93-929d-3c9a885f8000 uri = /v1/system/silos/demo-silo/policy
170932025-03-07T23:30:40.691ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dd89ce53-4800-4d93-929d-3c9a885f8000 response_code = 405 uri = /v1/system/silos/demo-silo/policy
170942025-03-07T23:30:40.691ZINFOtest_unauthorized (external client test context): client received response status = 405
170952025-03-07T23:30:40.691ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo/policy
170962025-03-07T23:30:40.692ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
170972025-03-07T23:30:40.692ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f85cdef-395d-426e-b927-15ee8c2b864d uri = /v1/system/silos/demo-silo/policy
170982025-03-07T23:30:40.692ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7f85cdef-395d-426e-b927-15ee8c2b864d response_code = 405 uri = /v1/system/silos/demo-silo/policy
170992025-03-07T23:30:40.692ZINFOtest_unauthorized (external client test context): client received response status = 405
171002025-03-07T23:30:40.692ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo/policy
171012025-03-07T23:30:40.692ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171022025-03-07T23:30:40.692ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 466ab54a-68ba-4af5-a699-2ef43e598430 uri = /v1/system/silos/demo-silo/policy
171032025-03-07T23:30:40.692ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 466ab54a-68ba-4af5-a699-2ef43e598430 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171042025-03-07T23:30:40.692ZINFOtest_unauthorized (external client test context): client received response status = 405
171052025-03-07T23:30:40.693ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo/policy
171062025-03-07T23:30:40.693ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171072025-03-07T23:30:40.693ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 486a284f-3dfb-4997-a1fc-9eedf5e66c09 uri = /v1/system/silos/demo-silo/policy
171082025-03-07T23:30:40.693ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 486a284f-3dfb-4997-a1fc-9eedf5e66c09 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171092025-03-07T23:30:40.693ZINFOtest_unauthorized (external client test context): client received response status = 405
171102025-03-07T23:30:40.693ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo/policy
171112025-03-07T23:30:40.693ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171122025-03-07T23:30:40.693ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c524bcad-01cb-4015-9f3e-0af876222dd1 uri = /v1/system/silos/demo-silo/policy
171132025-03-07T23:30:40.693ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c524bcad-01cb-4015-9f3e-0af876222dd1 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171142025-03-07T23:30:40.693ZINFOtest_unauthorized (external client test context): client received response status = 405
171152025-03-07T23:30:40.693ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo/policy
171162025-03-07T23:30:40.693ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171172025-03-07T23:30:40.694ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b1526000-40af-4f04-89f3-05f7c3c5ff40 uri = /v1/system/silos/demo-silo/policy
171182025-03-07T23:30:40.694ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b1526000-40af-4f04-89f3-05f7c3c5ff40 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171192025-03-07T23:30:40.694ZINFOtest_unauthorized (external client test context): client received response status = 405
171202025-03-07T23:30:40.694ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo/policy
171212025-03-07T23:30:40.694ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171222025-03-07T23:30:40.694ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a7d901cd-5d21-4c95-9af1-759eeef0e5cd uri = /v1/system/silos/demo-silo/policy
171232025-03-07T23:30:40.694ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a7d901cd-5d21-4c95-9af1-759eeef0e5cd response_code = 405 uri = /v1/system/silos/demo-silo/policy
171242025-03-07T23:30:40.694ZINFOtest_unauthorized (external client test context): client received response status = 405
171252025-03-07T23:30:40.694ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo/policy
171262025-03-07T23:30:40.694ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171272025-03-07T23:30:40.695ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3bee5da9-56c2-47b5-9d98-90087ddccc89 uri = /v1/system/silos/demo-silo/policy
171282025-03-07T23:30:40.695ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3bee5da9-56c2-47b5-9d98-90087ddccc89 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171292025-03-07T23:30:40.695ZINFOtest_unauthorized (external client test context): client received response status = 405
171302025-03-07T23:30:40.695ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo/policy
171312025-03-07T23:30:40.695ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171322025-03-07T23:30:40.695ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d04c95d8-df67-4eae-98ce-cca5a541d394 uri = /v1/system/silos/demo-silo/policy
171332025-03-07T23:30:40.695ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d04c95d8-df67-4eae-98ce-cca5a541d394 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171342025-03-07T23:30:40.695ZINFOtest_unauthorized (external client test context): client received response status = 405
171352025-03-07T23:30:40.695ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo/policy
171362025-03-07T23:30:40.695ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171372025-03-07T23:30:40.696ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0bf47ad1-84e6-4cd6-abfd-80fc24fe22e1 uri = /v1/system/silos/demo-silo/policy
171382025-03-07T23:30:40.696ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0bf47ad1-84e6-4cd6-abfd-80fc24fe22e1 response_code = 405 uri = /v1/system/silos/demo-silo/policy
171392025-03-07T23:30:40.698ZINFOtest_unauthorized (external client test context): client received response status = 405
171402025-03-07T23:30:40.698ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo/policy
171412025-03-07T23:30:40.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/policy
171422025-03-07T23:30:40.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 uri = /v1/system/silos/demo-silo/policy
171432025-03-07T23:30:40.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 uri = /v1/system/silos/demo-silo/policy
171442025-03-07T23:30:40.698ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/policy
171452025-03-07T23:30:40.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171462025-03-07T23:30:40.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171472025-03-07T23:30:40.699ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171482025-03-07T23:30:40.712ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171492025-03-07T23:30:40.712ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171502025-03-07T23:30:40.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171512025-03-07T23:30:40.733ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
171522025-03-07T23:30:40.733ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
171532025-03-07T23:30:40.733ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171542025-03-07T23:30:40.733ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171552025-03-07T23:30:40.734ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171562025-03-07T23:30:40.738ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
171572025-03-07T23:30:40.738ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171582025-03-07T23:30:40.738ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171592025-03-07T23:30:40.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171602025-03-07T23:30:40.747ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
171612025-03-07T23:30:40.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
171622025-03-07T23:30:40.751ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171632025-03-07T23:30:40.751ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171642025-03-07T23:30:40.752ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171652025-03-07T23:30:40.758ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
171662025-03-07T23:30:40.758ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
171672025-03-07T23:30:40.758ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171682025-03-07T23:30:40.758ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171692025-03-07T23:30:40.759ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171702025-03-07T23:30:40.771ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
171712025-03-07T23:30:40.771ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
171722025-03-07T23:30:40.771ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
171732025-03-07T23:30:40.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
171742025-03-07T23:30:40.777ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
171752025-03-07T23:30:40.781ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
171762025-03-07T23:30:40.781ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 uri = /v1/system/silos/demo-silo/policy
171772025-03-07T23:30:40.781ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database uri = /v1/system/silos/demo-silo/policy
171782025-03-07T23:30:40.781ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
171792025-03-07T23:30:40.783ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
171802025-03-07T23:30:40.790ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
171812025-03-07T23:30:40.791ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
171822025-03-07T23:30:40.791ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database uri = /v1/system/silos/demo-silo/policy
171832025-03-07T23:30:40.791ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
171842025-03-07T23:30:40.791ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
171852025-03-07T23:30:40.800ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
171862025-03-07T23:30:40.800ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database uri = /v1/system/silos/demo-silo/policy
171872025-03-07T23:30:40.800ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
171882025-03-07T23:30:40.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
171892025-03-07T23:30:40.810ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
171902025-03-07T23:30:40.824ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
171912025-03-07T23:30:40.824ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database uri = /v1/system/silos/demo-silo/policy
171922025-03-07T23:30:40.824ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
171932025-03-07T23:30:40.826ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
171942025-03-07T23:30:40.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/policy
171952025-03-07T23:30:40.828ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/policy
171962025-03-07T23:30:40.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database uri = /v1/system/silos/demo-silo/policy
171972025-03-07T23:30:40.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
171982025-03-07T23:30:40.828ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
171992025-03-07T23:30:40.833ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/policy
172002025-03-07T23:30:40.833ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database uri = /v1/system/silos/demo-silo/policy
172012025-03-07T23:30:40.833ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/policy
172022025-03-07T23:30:40.834ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/policy
172032025-03-07T23:30:40.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/policy
172042025-03-07T23:30:40.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/policy
172052025-03-07T23:30:40.853ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 155085 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 502f223a-57cd-4937-bf73-168b30bd0098 response_code = 200 uri = /v1/system/silos/demo-silo/policy
172062025-03-07T23:30:40.854ZINFOtest_unauthorized (external client test context): client received response status = 200
172072025-03-07T23:30:40.855ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silos/demo-silo/quotas
172082025-03-07T23:30:40.855ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silos/demo-silo/quotas
172092025-03-07T23:30:40.855ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
172102025-03-07T23:30:40.856ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 uri = /v1/system/silos/demo-silo/quotas
172112025-03-07T23:30:40.856ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 uri = /v1/system/silos/demo-silo/quotas
172122025-03-07T23:30:40.856ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/quotas
172132025-03-07T23:30:40.856ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172142025-03-07T23:30:40.856ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172152025-03-07T23:30:40.856ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172162025-03-07T23:30:40.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172172025-03-07T23:30:40.859ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172182025-03-07T23:30:40.860ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172192025-03-07T23:30:40.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
172202025-03-07T23:30:40.863ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
172212025-03-07T23:30:40.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172222025-03-07T23:30:40.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172232025-03-07T23:30:40.863ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172242025-03-07T23:30:40.867ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
172252025-03-07T23:30:40.868ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172262025-03-07T23:30:40.868ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172272025-03-07T23:30:40.868ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172282025-03-07T23:30:40.876ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
172292025-03-07T23:30:40.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
172302025-03-07T23:30:40.882ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172312025-03-07T23:30:40.882ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172322025-03-07T23:30:40.883ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172332025-03-07T23:30:40.886ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
172342025-03-07T23:30:40.886ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
172352025-03-07T23:30:40.886ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172362025-03-07T23:30:40.886ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172372025-03-07T23:30:40.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172382025-03-07T23:30:40.892ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
172392025-03-07T23:30:40.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172402025-03-07T23:30:40.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172412025-03-07T23:30:40.893ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172422025-03-07T23:30:40.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
172432025-03-07T23:30:40.900ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
172442025-03-07T23:30:40.900ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 uri = /v1/system/silos/demo-silo/quotas
172452025-03-07T23:30:40.900ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database uri = /v1/system/silos/demo-silo/quotas
172462025-03-07T23:30:40.900ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172472025-03-07T23:30:40.901ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172482025-03-07T23:30:40.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
172492025-03-07T23:30:40.903ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
172502025-03-07T23:30:40.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database uri = /v1/system/silos/demo-silo/quotas
172512025-03-07T23:30:40.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172522025-03-07T23:30:40.904ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172532025-03-07T23:30:40.907ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
172542025-03-07T23:30:40.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database uri = /v1/system/silos/demo-silo/quotas
172552025-03-07T23:30:40.907ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172562025-03-07T23:30:40.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172572025-03-07T23:30:40.911ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
172582025-03-07T23:30:40.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172592025-03-07T23:30:40.923ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
172602025-03-07T23:30:40.923ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
172612025-03-07T23:30:40.924ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database uri = /v1/system/silos/demo-silo/quotas
172622025-03-07T23:30:40.924ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172632025-03-07T23:30:40.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172642025-03-07T23:30:40.929ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
172652025-03-07T23:30:40.929ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database uri = /v1/system/silos/demo-silo/quotas
172662025-03-07T23:30:40.929ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172672025-03-07T23:30:40.930ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172682025-03-07T23:30:40.933ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
172692025-03-07T23:30:40.947ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172702025-03-07T23:30:40.947ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database uri = /v1/system/silos/demo-silo/quotas
172712025-03-07T23:30:40.947ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
172722025-03-07T23:30:40.947ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
172732025-03-07T23:30:40.952ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 96581 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 30b888a6-84c4-40ba-ab92-4ab09dc3f9f3 response_code = 200 uri = /v1/system/silos/demo-silo/quotas
172742025-03-07T23:30:40.954ZINFOtest_unauthorized (external client test context): client received response status = 200
172752025-03-07T23:30:40.954ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silos/demo-silo/quotas
172762025-03-07T23:30:40.954ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
172772025-03-07T23:30:40.954ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f uri = /v1/system/silos/demo-silo/quotas
172782025-03-07T23:30:40.956ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f uri = /v1/system/silos/demo-silo/quotas
172792025-03-07T23:30:40.957ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/quotas
172802025-03-07T23:30:40.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172812025-03-07T23:30:40.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172822025-03-07T23:30:40.957ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172832025-03-07T23:30:40.959ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172842025-03-07T23:30:40.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172852025-03-07T23:30:40.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172862025-03-07T23:30:40.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
172872025-03-07T23:30:40.964ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
172882025-03-07T23:30:40.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172892025-03-07T23:30:40.964ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172902025-03-07T23:30:40.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172912025-03-07T23:30:40.970ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
172922025-03-07T23:30:40.971ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172932025-03-07T23:30:40.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172942025-03-07T23:30:40.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
172952025-03-07T23:30:40.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
172962025-03-07T23:30:40.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
172972025-03-07T23:30:40.982ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
172982025-03-07T23:30:40.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
172992025-03-07T23:30:40.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173002025-03-07T23:30:40.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
173012025-03-07T23:30:40.990ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
173022025-03-07T23:30:40.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173032025-03-07T23:30:40.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173042025-03-07T23:30:40.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173052025-03-07T23:30:40.994ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
173062025-03-07T23:30:40.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173072025-03-07T23:30:40.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173082025-03-07T23:30:40.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173092025-03-07T23:30:40.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
173102025-03-07T23:30:40.999ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
173112025-03-07T23:30:41.000ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f uri = /v1/system/silos/demo-silo/quotas
173122025-03-07T23:30:41.000ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Database uri = /v1/system/silos/demo-silo/quotas
173132025-03-07T23:30:41.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173142025-03-07T23:30:41.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173152025-03-07T23:30:41.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
173162025-03-07T23:30:41.006ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
173172025-03-07T23:30:41.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Database uri = /v1/system/silos/demo-silo/quotas
173182025-03-07T23:30:41.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173192025-03-07T23:30:41.008ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173202025-03-07T23:30:41.023ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
173212025-03-07T23:30:41.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Database uri = /v1/system/silos/demo-silo/quotas
173222025-03-07T23:30:41.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173232025-03-07T23:30:41.025ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173242025-03-07T23:30:41.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173252025-03-07T23:30:41.053ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/quotas
173262025-03-07T23:30:41.053ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 98695 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 05797c5f-3b71-4870-a5d1-bc89f84a3f3f response_code = 404 uri = /v1/system/silos/demo-silo/quotas
173272025-03-07T23:30:41.055ZINFOtest_unauthorized (external client test context): client received response status = 404
173282025-03-07T23:30:41.055ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silos/demo-silo/quotas
173292025-03-07T23:30:41.055ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
173302025-03-07T23:30:41.055ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 uri = /v1/system/silos/demo-silo/quotas
173312025-03-07T23:30:41.055ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 uri = /v1/system/silos/demo-silo/quotas
173322025-03-07T23:30:41.055ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 uri = /v1/system/silos/demo-silo/quotas
173332025-03-07T23:30:41.055ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 uri = /v1/system/silos/demo-silo/quotas
173342025-03-07T23:30:41.055ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 resource = Database uri = /v1/system/silos/demo-silo/quotas
173352025-03-07T23:30:41.055ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173362025-03-07T23:30:41.055ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/quotas
173372025-03-07T23:30:41.056ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 887 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27243f51-7cdd-4be9-bc9b-c952d0ff09b8 response_code = 401 uri = /v1/system/silos/demo-silo/quotas
173382025-03-07T23:30:41.056ZINFOtest_unauthorized (external client test context): client received response status = 401
173392025-03-07T23:30:41.057ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silos/demo-silo/quotas
173402025-03-07T23:30:41.057ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
173412025-03-07T23:30:41.057ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2653e029-1b4b-4118-8ac9-095629b8bd52 uri = /v1/system/silos/demo-silo/quotas
173422025-03-07T23:30:41.057ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2653e029-1b4b-4118-8ac9-095629b8bd52 uri = /v1/system/silos/demo-silo/quotas
173432025-03-07T23:30:41.057ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2653e029-1b4b-4118-8ac9-095629b8bd52 uri = /v1/system/silos/demo-silo/quotas
173442025-03-07T23:30:41.057ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 186 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2653e029-1b4b-4118-8ac9-095629b8bd52 response_code = 401 uri = /v1/system/silos/demo-silo/quotas
173452025-03-07T23:30:41.060ZINFOtest_unauthorized (external client test context): client received response status = 401
173462025-03-07T23:30:41.060ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silos/demo-silo/quotas
173472025-03-07T23:30:41.060ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
173482025-03-07T23:30:41.060ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fef0649-0ba6-4c11-81fd-2b9fc907d00b uri = /v1/system/silos/demo-silo/quotas
173492025-03-07T23:30:41.060ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fef0649-0ba6-4c11-81fd-2b9fc907d00b uri = /v1/system/silos/demo-silo/quotas
173502025-03-07T23:30:41.060ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:349:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:359:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fef0649-0ba6-4c11-81fd-2b9fc907d00b uri = /v1/system/silos/demo-silo/quotas
173512025-03-07T23:30:41.060ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1306 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fef0649-0ba6-4c11-81fd-2b9fc907d00b response_code = 401 uri = /v1/system/silos/demo-silo/quotas
173522025-03-07T23:30:41.060ZINFOtest_unauthorized (external client test context): client received response status = 401
173532025-03-07T23:30:41.060ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silos/demo-silo/quotas
173542025-03-07T23:30:41.060ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
173552025-03-07T23:30:41.060ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 uri = /v1/system/silos/demo-silo/quotas
173562025-03-07T23:30:41.060ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 uri = /v1/system/silos/demo-silo/quotas
173572025-03-07T23:30:41.060ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silos/demo-silo/quotas
173582025-03-07T23:30:41.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173592025-03-07T23:30:41.061ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173602025-03-07T23:30:41.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173612025-03-07T23:30:41.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173622025-03-07T23:30:41.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173632025-03-07T23:30:41.066ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173642025-03-07T23:30:41.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
173652025-03-07T23:30:41.072ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
173662025-03-07T23:30:41.072ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173672025-03-07T23:30:41.072ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173682025-03-07T23:30:41.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173692025-03-07T23:30:41.078ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
173702025-03-07T23:30:41.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173712025-03-07T23:30:41.078ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173722025-03-07T23:30:41.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173732025-03-07T23:30:41.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
173742025-03-07T23:30:41.094ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
173752025-03-07T23:30:41.094ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173762025-03-07T23:30:41.094ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173772025-03-07T23:30:41.095ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173782025-03-07T23:30:41.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
173792025-03-07T23:30:41.100ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
173802025-03-07T23:30:41.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173812025-03-07T23:30:41.100ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173822025-03-07T23:30:41.101ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173832025-03-07T23:30:41.103ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
173842025-03-07T23:30:41.103ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
173852025-03-07T23:30:41.103ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
173862025-03-07T23:30:41.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
173872025-03-07T23:30:41.106ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
173882025-03-07T23:30:41.111ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
173892025-03-07T23:30:41.111ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 uri = /v1/system/silos/demo-silo/quotas
173902025-03-07T23:30:41.112ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Database uri = /v1/system/silos/demo-silo/quotas
173912025-03-07T23:30:41.112ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173922025-03-07T23:30:41.113ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173932025-03-07T23:30:41.115ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
173942025-03-07T23:30:41.115ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
173952025-03-07T23:30:41.115ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Database uri = /v1/system/silos/demo-silo/quotas
173962025-03-07T23:30:41.115ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
173972025-03-07T23:30:41.116ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
173982025-03-07T23:30:41.120ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
173992025-03-07T23:30:41.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Database uri = /v1/system/silos/demo-silo/quotas
174002025-03-07T23:30:41.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
174012025-03-07T23:30:41.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
174022025-03-07T23:30:41.138ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
174032025-03-07T23:30:41.188ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/silos/demo-silo/quotas
174042025-03-07T23:30:41.188ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 127793 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae495fb8-bbed-4480-8462-8cddd58d8874 response_code = 404 uri = /v1/system/silos/demo-silo/quotas
174052025-03-07T23:30:41.188ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
174062025-03-07T23:30:41.189ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
174072025-03-07T23:30:41.189ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
174082025-03-07T23:30:41.190ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
174092025-03-07T23:30:41.192ZINFOtest_unauthorized (external client test context): client received response status = 404
174102025-03-07T23:30:41.192ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silos/demo-silo/quotas
174112025-03-07T23:30:41.192ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174122025-03-07T23:30:41.195ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
174132025-03-07T23:30:41.195ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
174142025-03-07T23:30:41.196ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c uri = /v1/system/silos/demo-silo/quotas
174152025-03-07T23:30:41.196ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c uri = /v1/system/silos/demo-silo/quotas
174162025-03-07T23:30:41.197ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c uri = /v1/system/silos/demo-silo/quotas
174172025-03-07T23:30:41.197ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c uri = /v1/system/silos/demo-silo/quotas
174182025-03-07T23:30:41.197ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c resource = Database uri = /v1/system/silos/demo-silo/quotas
174192025-03-07T23:30:41.197ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
174202025-03-07T23:30:41.197ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silos/demo-silo/quotas
174212025-03-07T23:30:41.197ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 957 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00b8111c-ad31-4ea1-879c-f5b33e9b185c response_code = 401 uri = /v1/system/silos/demo-silo/quotas
174222025-03-07T23:30:41.200ZINFOtest_unauthorized (external client test context): client received response status = 401
174232025-03-07T23:30:41.200ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silos/demo-silo/quotas
174242025-03-07T23:30:41.200ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174252025-03-07T23:30:41.201ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
174262025-03-07T23:30:41.201ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
174272025-03-07T23:30:41.201ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1e95fd6-df58-4bcd-8d93-eaebda97a31e uri = /v1/system/silos/demo-silo/quotas
174282025-03-07T23:30:41.201ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1e95fd6-df58-4bcd-8d93-eaebda97a31e uri = /v1/system/silos/demo-silo/quotas
174292025-03-07T23:30:41.201ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1e95fd6-df58-4bcd-8d93-eaebda97a31e uri = /v1/system/silos/demo-silo/quotas
174302025-03-07T23:30:41.201ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 412 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1e95fd6-df58-4bcd-8d93-eaebda97a31e response_code = 401 uri = /v1/system/silos/demo-silo/quotas
174312025-03-07T23:30:41.202ZINFOtest_unauthorized (external client test context): client received response status = 401
174322025-03-07T23:30:41.202ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silos/demo-silo/quotas
174332025-03-07T23:30:41.202ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174342025-03-07T23:30:41.202ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7245f86a-5327-4f6a-839f-895cc34d90c6 uri = /v1/system/silos/demo-silo/quotas
174352025-03-07T23:30:41.203ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7245f86a-5327-4f6a-839f-895cc34d90c6 uri = /v1/system/silos/demo-silo/quotas
174362025-03-07T23:30:41.205ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:372:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:388:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_quotas_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SiloQuotasUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloQuotas>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7245f86a-5327-4f6a-839f-895cc34d90c6 uri = /v1/system/silos/demo-silo/quotas
174372025-03-07T23:30:41.205ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2971 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7245f86a-5327-4f6a-839f-895cc34d90c6 response_code = 401 uri = /v1/system/silos/demo-silo/quotas
174382025-03-07T23:30:41.205ZINFOtest_unauthorized (external client test context): client received response status = 401
174392025-03-07T23:30:41.205ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silos/demo-silo/quotas
174402025-03-07T23:30:41.205ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174412025-03-07T23:30:41.205ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51766462-1c48-4a0f-91b4-9ef2ead1ffe3 uri = /v1/system/silos/demo-silo/quotas
174422025-03-07T23:30:41.206ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 51766462-1c48-4a0f-91b4-9ef2ead1ffe3 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174432025-03-07T23:30:41.206ZINFOtest_unauthorized (external client test context): client received response status = 405
174442025-03-07T23:30:41.206ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silos/demo-silo/quotas
174452025-03-07T23:30:41.206ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174462025-03-07T23:30:41.206ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b9e30b7b-abe9-4b38-bf1a-82e233ef8ff0 uri = /v1/system/silos/demo-silo/quotas
174472025-03-07T23:30:41.207ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 558 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b9e30b7b-abe9-4b38-bf1a-82e233ef8ff0 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174482025-03-07T23:30:41.207ZINFOtest_unauthorized (external client test context): client received response status = 405
174492025-03-07T23:30:41.207ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silos/demo-silo/quotas
174502025-03-07T23:30:41.207ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174512025-03-07T23:30:41.207ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3baebdc-22db-4dfa-86bf-07611e706f98 uri = /v1/system/silos/demo-silo/quotas
174522025-03-07T23:30:41.207ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3baebdc-22db-4dfa-86bf-07611e706f98 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174532025-03-07T23:30:41.207ZINFOtest_unauthorized (external client test context): client received response status = 405
174542025-03-07T23:30:41.207ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silos/demo-silo/quotas
174552025-03-07T23:30:41.208ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174562025-03-07T23:30:41.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 50513451-cd91-4e6c-bae3-40e8fc47c073 uri = /v1/system/silos/demo-silo/quotas
174572025-03-07T23:30:41.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 50513451-cd91-4e6c-bae3-40e8fc47c073 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174582025-03-07T23:30:41.208ZINFOtest_unauthorized (external client test context): client received response status = 405
174592025-03-07T23:30:41.208ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silos/demo-silo/quotas
174602025-03-07T23:30:41.208ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174612025-03-07T23:30:41.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 387203d5-bdcc-4397-8f11-b15d78c7f3e8 uri = /v1/system/silos/demo-silo/quotas
174622025-03-07T23:30:41.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 387203d5-bdcc-4397-8f11-b15d78c7f3e8 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174632025-03-07T23:30:41.209ZINFOtest_unauthorized (external client test context): client received response status = 405
174642025-03-07T23:30:41.209ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silos/demo-silo/quotas
174652025-03-07T23:30:41.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174662025-03-07T23:30:41.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = db0bbbfe-76a4-4520-9afd-692740d179d5 uri = /v1/system/silos/demo-silo/quotas
174672025-03-07T23:30:41.209ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = db0bbbfe-76a4-4520-9afd-692740d179d5 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174682025-03-07T23:30:41.209ZINFOtest_unauthorized (external client test context): client received response status = 405
174692025-03-07T23:30:41.209ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silos/demo-silo/quotas
174702025-03-07T23:30:41.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174712025-03-07T23:30:41.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c8bf0dc0-e6e0-4cb2-ad8e-95c79adac487 uri = /v1/system/silos/demo-silo/quotas
174722025-03-07T23:30:41.209ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c8bf0dc0-e6e0-4cb2-ad8e-95c79adac487 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174732025-03-07T23:30:41.210ZINFOtest_unauthorized (external client test context): client received response status = 405
174742025-03-07T23:30:41.210ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silos/demo-silo/quotas
174752025-03-07T23:30:41.210ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174762025-03-07T23:30:41.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bc9af581-ea85-4385-8de2-ce7704a80733 uri = /v1/system/silos/demo-silo/quotas
174772025-03-07T23:30:41.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 175 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bc9af581-ea85-4385-8de2-ce7704a80733 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174782025-03-07T23:30:41.211ZINFOtest_unauthorized (external client test context): client received response status = 405
174792025-03-07T23:30:41.211ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silos/demo-silo/quotas
174802025-03-07T23:30:41.211ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174812025-03-07T23:30:41.211ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = af21feaf-d54d-4ed8-a181-7ad843420f90 uri = /v1/system/silos/demo-silo/quotas
174822025-03-07T23:30:41.211ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 174 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = af21feaf-d54d-4ed8-a181-7ad843420f90 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174832025-03-07T23:30:41.212ZINFOtest_unauthorized (external client test context): client received response status = 405
174842025-03-07T23:30:41.212ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silos/demo-silo/quotas
174852025-03-07T23:30:41.212ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174862025-03-07T23:30:41.212ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c403c461-12ed-44dc-8a04-666215f307b6 uri = /v1/system/silos/demo-silo/quotas
174872025-03-07T23:30:41.212ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c403c461-12ed-44dc-8a04-666215f307b6 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174882025-03-07T23:30:41.213ZINFOtest_unauthorized (external client test context): client received response status = 405
174892025-03-07T23:30:41.213ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silos/demo-silo/quotas
174902025-03-07T23:30:41.213ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174912025-03-07T23:30:41.213ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ab38a5e4-1a0e-4406-8968-adebc6c875e5 uri = /v1/system/silos/demo-silo/quotas
174922025-03-07T23:30:41.213ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ab38a5e4-1a0e-4406-8968-adebc6c875e5 response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174932025-03-07T23:30:41.214ZINFOtest_unauthorized (external client test context): client received response status = 405
174942025-03-07T23:30:41.214ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silos/demo-silo/quotas
174952025-03-07T23:30:41.214ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
174962025-03-07T23:30:41.214ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e03aa056-3008-46d0-912f-bcb1d6c05d0f uri = /v1/system/silos/demo-silo/quotas
174972025-03-07T23:30:41.214ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 106 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e03aa056-3008-46d0-912f-bcb1d6c05d0f response_code = 405 uri = /v1/system/silos/demo-silo/quotas
174982025-03-07T23:30:41.214ZINFOtest_unauthorized (external client test context): client received response status = 405
174992025-03-07T23:30:41.214ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silos/demo-silo/quotas
175002025-03-07T23:30:41.214ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silos/demo-silo/quotas
175012025-03-07T23:30:41.214ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 uri = /v1/system/silos/demo-silo/quotas
175022025-03-07T23:30:41.215ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 uri = /v1/system/silos/demo-silo/quotas
175032025-03-07T23:30:41.215ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silos/demo-silo/quotas
175042025-03-07T23:30:41.215ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175052025-03-07T23:30:41.215ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175062025-03-07T23:30:41.215ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175072025-03-07T23:30:41.218ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175082025-03-07T23:30:41.218ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175092025-03-07T23:30:41.219ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175102025-03-07T23:30:41.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
175112025-03-07T23:30:41.223ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
175122025-03-07T23:30:41.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175132025-03-07T23:30:41.223ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175142025-03-07T23:30:41.224ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175152025-03-07T23:30:41.227ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
175162025-03-07T23:30:41.228ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175172025-03-07T23:30:41.228ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175182025-03-07T23:30:41.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175192025-03-07T23:30:41.232ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
175202025-03-07T23:30:41.242ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
175212025-03-07T23:30:41.242ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175222025-03-07T23:30:41.242ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175232025-03-07T23:30:41.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175242025-03-07T23:30:41.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
175252025-03-07T23:30:41.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
175262025-03-07T23:30:41.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175272025-03-07T23:30:41.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175282025-03-07T23:30:41.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175292025-03-07T23:30:41.249ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
175302025-03-07T23:30:41.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175312025-03-07T23:30:41.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175322025-03-07T23:30:41.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175332025-03-07T23:30:41.252ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
175342025-03-07T23:30:41.262ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
175352025-03-07T23:30:41.262ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 uri = /v1/system/silos/demo-silo/quotas
175362025-03-07T23:30:41.263ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database uri = /v1/system/silos/demo-silo/quotas
175372025-03-07T23:30:41.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
175382025-03-07T23:30:41.264ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175392025-03-07T23:30:41.268ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
175402025-03-07T23:30:41.268ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
175412025-03-07T23:30:41.268ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database uri = /v1/system/silos/demo-silo/quotas
175422025-03-07T23:30:41.268ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
175432025-03-07T23:30:41.271ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175442025-03-07T23:30:41.279ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
175452025-03-07T23:30:41.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database uri = /v1/system/silos/demo-silo/quotas
175462025-03-07T23:30:41.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
175472025-03-07T23:30:41.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175482025-03-07T23:30:41.284ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
175492025-03-07T23:30:41.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175502025-03-07T23:30:41.304ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/silos/demo-silo/quotas
175512025-03-07T23:30:41.304ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/silos/demo-silo/quotas
175522025-03-07T23:30:41.304ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database uri = /v1/system/silos/demo-silo/quotas
175532025-03-07T23:30:41.304ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
175542025-03-07T23:30:41.305ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175552025-03-07T23:30:41.305ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
175562025-03-07T23:30:41.309ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silos/demo-silo/quotas
175572025-03-07T23:30:41.309ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database uri = /v1/system/silos/demo-silo/quotas
175582025-03-07T23:30:41.309ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
175592025-03-07T23:30:41.309ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175602025-03-07T23:30:41.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silos/demo-silo/quotas
175612025-03-07T23:30:41.328ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175622025-03-07T23:30:41.330ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database uri = /v1/system/silos/demo-silo/quotas
175632025-03-07T23:30:41.330ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 roles = RoleSet { roles: {} } uri = /v1/system/silos/demo-silo/quotas
175642025-03-07T23:30:41.330ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 resource = Database result = Ok(()) uri = /v1/system/silos/demo-silo/quotas
175652025-03-07T23:30:41.331ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 116979 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17f0b0a8-e410-4882-8413-092968c79d71 response_code = 200 uri = /v1/system/silos/demo-silo/quotas
175662025-03-07T23:30:41.333ZINFOtest_unauthorized (external client test context): client received response status = 200
175672025-03-07T23:30:41.333ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/silo-quotas
175682025-03-07T23:30:41.333ZINFOtest_unauthorized: test: privileged GET url = /v1/system/silo-quotas
175692025-03-07T23:30:41.333ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silo-quotas
175702025-03-07T23:30:41.333ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 uri = /v1/system/silo-quotas
175712025-03-07T23:30:41.333ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 uri = /v1/system/silo-quotas
175722025-03-07T23:30:41.334ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silo-quotas
175732025-03-07T23:30:41.334ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175742025-03-07T23:30:41.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175752025-03-07T23:30:41.335ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175762025-03-07T23:30:41.337ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175772025-03-07T23:30:41.337ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175782025-03-07T23:30:41.337ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175792025-03-07T23:30:41.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
175802025-03-07T23:30:41.339ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
175812025-03-07T23:30:41.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175822025-03-07T23:30:41.339ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175832025-03-07T23:30:41.340ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175842025-03-07T23:30:41.342ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
175852025-03-07T23:30:41.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175862025-03-07T23:30:41.342ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175872025-03-07T23:30:41.342ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175882025-03-07T23:30:41.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
175892025-03-07T23:30:41.349ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
175902025-03-07T23:30:41.350ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175912025-03-07T23:30:41.350ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175922025-03-07T23:30:41.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175932025-03-07T23:30:41.362ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
175942025-03-07T23:30:41.362ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
175952025-03-07T23:30:41.362ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
175962025-03-07T23:30:41.362ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
175972025-03-07T23:30:41.363ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
175982025-03-07T23:30:41.369ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
175992025-03-07T23:30:41.370ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176002025-03-07T23:30:41.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176012025-03-07T23:30:41.372ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176022025-03-07T23:30:41.376ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
176032025-03-07T23:30:41.379ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
176042025-03-07T23:30:41.379ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 uri = /v1/system/silo-quotas
176052025-03-07T23:30:41.379ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource = Fleet uri = /v1/system/silo-quotas
176062025-03-07T23:30:41.379ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silo-quotas
176072025-03-07T23:30:41.380ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource = Database uri = /v1/system/silo-quotas
176082025-03-07T23:30:41.380ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176092025-03-07T23:30:41.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource = Database result = Ok(()) uri = /v1/system/silo-quotas
176102025-03-07T23:30:41.388ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silo-quotas
176112025-03-07T23:30:41.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource = Fleet result = Ok(()) uri = /v1/system/silo-quotas
176122025-03-07T23:30:41.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource = Database uri = /v1/system/silo-quotas
176132025-03-07T23:30:41.395ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176142025-03-07T23:30:41.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 resource = Database result = Ok(()) uri = /v1/system/silo-quotas
176152025-03-07T23:30:41.398ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 65153 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1b41996-e954-46e6-a2cf-450c4c791091 response_code = 200 uri = /v1/system/silo-quotas
176162025-03-07T23:30:41.400ZINFOtest_unauthorized (external client test context): client received response status = 200
176172025-03-07T23:30:41.400ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/silo-quotas
176182025-03-07T23:30:41.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silo-quotas
176192025-03-07T23:30:41.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac uri = /v1/system/silo-quotas
176202025-03-07T23:30:41.400ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac uri = /v1/system/silo-quotas
176212025-03-07T23:30:41.400ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/silo-quotas
176222025-03-07T23:30:41.401ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176232025-03-07T23:30:41.401ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176242025-03-07T23:30:41.402ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176252025-03-07T23:30:41.404ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176262025-03-07T23:30:41.404ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176272025-03-07T23:30:41.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176282025-03-07T23:30:41.412ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
176292025-03-07T23:30:41.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
176302025-03-07T23:30:41.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
176312025-03-07T23:30:41.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
176322025-03-07T23:30:41.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176332025-03-07T23:30:41.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176342025-03-07T23:30:41.417ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176352025-03-07T23:30:41.418ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 442a26bc-1b9c-43ea-9bf3-dafa33f53445 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
176362025-03-07T23:30:41.419ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 442a26bc-1b9c-43ea-9bf3-dafa33f53445 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
176372025-03-07T23:30:41.419ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 442a26bc-1b9c-43ea-9bf3-dafa33f53445 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
176382025-03-07T23:30:41.420ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 442a26bc-1b9c-43ea-9bf3-dafa33f53445 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
176392025-03-07T23:30:41.421ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
176402025-03-07T23:30:41.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176412025-03-07T23:30:41.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176422025-03-07T23:30:41.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176432025-03-07T23:30:41.424ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5404 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 442a26bc-1b9c-43ea-9bf3-dafa33f53445 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
176442025-03-07T23:30:41.424ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "442a26bc-1b9c-43ea-9bf3-dafa33f53445", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:41 GMT"} })
176452025-03-07T23:30:41.424ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
176462025-03-07T23:30:41.424ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10ddb347-3058-48d4-ac74-27d488a0c457 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
176472025-03-07T23:30:41.425ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10ddb347-3058-48d4-ac74-27d488a0c457 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
176482025-03-07T23:30:41.425ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10ddb347-3058-48d4-ac74-27d488a0c457 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
176492025-03-07T23:30:41.426ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10ddb347-3058-48d4-ac74-27d488a0c457 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
176502025-03-07T23:30:41.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
176512025-03-07T23:30:41.433ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
176522025-03-07T23:30:41.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176532025-03-07T23:30:41.433ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176542025-03-07T23:30:41.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176552025-03-07T23:30:41.438ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 13498 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 10ddb347-3058-48d4-ac74-27d488a0c457 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
176562025-03-07T23:30:41.438ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "10ddb347-3058-48d4-ac74-27d488a0c457", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:41 GMT"} })
176572025-03-07T23:30:41.444ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
176582025-03-07T23:30:41.444ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
176592025-03-07T23:30:41.450ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
176602025-03-07T23:30:41.450ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
176612025-03-07T23:30:41.451ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
176622025-03-07T23:30:41.451ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176632025-03-07T23:30:41.451ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176642025-03-07T23:30:41.452ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176652025-03-07T23:30:41.458ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
176662025-03-07T23:30:41.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
176672025-03-07T23:30:41.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
176682025-03-07T23:30:41.461ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
176692025-03-07T23:30:41.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
176702025-03-07T23:30:41.472ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
176712025-03-07T23:30:41.472ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac uri = /v1/system/silo-quotas
176722025-03-07T23:30:41.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac resource = Fleet uri = /v1/system/silo-quotas
176732025-03-07T23:30:41.472ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silo-quotas
176742025-03-07T23:30:41.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac resource = Database uri = /v1/system/silo-quotas
176752025-03-07T23:30:41.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176762025-03-07T23:30:41.473ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac resource = Database result = Ok(()) uri = /v1/system/silo-quotas
176772025-03-07T23:30:41.477ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176782025-03-07T23:30:41.489ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac resource = Fleet result = Err(Forbidden) uri = /v1/system/silo-quotas
176792025-03-07T23:30:41.491ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 90467 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d423bb7c-9b32-4902-9926-e5a73f3b82ac response_code = 403 uri = /v1/system/silo-quotas
176802025-03-07T23:30:41.492ZINFOtest_unauthorized (external client test context): client received response status = 403
176812025-03-07T23:30:41.492ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/silo-quotas
176822025-03-07T23:30:41.492ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silo-quotas
176832025-03-07T23:30:41.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 uri = /v1/system/silo-quotas
176842025-03-07T23:30:41.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 uri = /v1/system/silo-quotas
176852025-03-07T23:30:41.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 uri = /v1/system/silo-quotas
176862025-03-07T23:30:41.492ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 uri = /v1/system/silo-quotas
176872025-03-07T23:30:41.492ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 resource = Fleet uri = /v1/system/silo-quotas
176882025-03-07T23:30:41.492ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
176892025-03-07T23:30:41.492ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/silo-quotas
176902025-03-07T23:30:41.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 801 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fdd506d3-c5ee-44ea-93fd-f80a1c6dde73 response_code = 401 uri = /v1/system/silo-quotas
176912025-03-07T23:30:41.493ZINFOtest_unauthorized (external client test context): client received response status = 401
176922025-03-07T23:30:41.493ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/silo-quotas
176932025-03-07T23:30:41.493ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silo-quotas
176942025-03-07T23:30:41.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f9e681f4-d1b6-4562-b445-a6ffe62a3664 uri = /v1/system/silo-quotas
176952025-03-07T23:30:41.501ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f9e681f4-d1b6-4562-b445-a6ffe62a3664 uri = /v1/system/silo-quotas
176962025-03-07T23:30:41.501ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f9e681f4-d1b6-4562-b445-a6ffe62a3664 uri = /v1/system/silo-quotas
176972025-03-07T23:30:41.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 268 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f9e681f4-d1b6-4562-b445-a6ffe62a3664 response_code = 401 uri = /v1/system/silo-quotas
176982025-03-07T23:30:41.502ZINFOtest_unauthorized (external client test context): client received response status = 401
176992025-03-07T23:30:41.502ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/silo-quotas
177002025-03-07T23:30:41.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silo-quotas
177012025-03-07T23:30:41.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24110829-3d73-4d70-b420-43899a39ce70 uri = /v1/system/silo-quotas
177022025-03-07T23:30:41.503ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24110829-3d73-4d70-b420-43899a39ce70 uri = /v1/system/silo-quotas
177032025-03-07T23:30:41.504ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:319:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloQuotas>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:337:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloQuotas>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::system_quotas_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloQuotas>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24110829-3d73-4d70-b420-43899a39ce70 uri = /v1/system/silo-quotas
177042025-03-07T23:30:41.504ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1401 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24110829-3d73-4d70-b420-43899a39ce70 response_code = 401 uri = /v1/system/silo-quotas
177052025-03-07T23:30:41.505ZINFOtest_unauthorized (external client test context): client received response status = 401
177062025-03-07T23:30:41.505ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/silo-quotas
177072025-03-07T23:30:41.505ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silo-quotas
177082025-03-07T23:30:41.505ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cc2e5874-bca5-498a-b304-d822619ca856 uri = /v1/system/silo-quotas
177092025-03-07T23:30:41.505ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 105 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cc2e5874-bca5-498a-b304-d822619ca856 response_code = 405 uri = /v1/system/silo-quotas
177102025-03-07T23:30:41.507ZINFOtest_unauthorized (external client test context): client received response status = 405
177112025-03-07T23:30:41.507ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/silo-quotas
177122025-03-07T23:30:41.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silo-quotas
177132025-03-07T23:30:41.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fd3f43c4-0702-4145-8535-bd3704e26f0d uri = /v1/system/silo-quotas
177142025-03-07T23:30:41.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fd3f43c4-0702-4145-8535-bd3704e26f0d response_code = 405 uri = /v1/system/silo-quotas
177152025-03-07T23:30:41.507ZINFOtest_unauthorized (external client test context): client received response status = 405
177162025-03-07T23:30:41.507ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/silo-quotas
177172025-03-07T23:30:41.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silo-quotas
177182025-03-07T23:30:41.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 02b0b5b1-9835-49a7-816b-155d1b28b69e uri = /v1/system/silo-quotas
177192025-03-07T23:30:41.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 02b0b5b1-9835-49a7-816b-155d1b28b69e response_code = 405 uri = /v1/system/silo-quotas
177202025-03-07T23:30:41.507ZINFOtest_unauthorized (external client test context): client received response status = 405
177212025-03-07T23:30:41.508ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/silo-quotas
177222025-03-07T23:30:41.508ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/silo-quotas
177232025-03-07T23:30:41.508ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 19e149e4-11d1-42d9-bcd2-268303da2279 uri = /v1/system/silo-quotas
177242025-03-07T23:30:41.508ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 19e149e4-11d1-42d9-bcd2-268303da2279 response_code = 405 uri = /v1/system/silo-quotas
177252025-03-07T23:30:41.508ZINFOtest_unauthorized (external client test context): client received response status = 405
177262025-03-07T23:30:41.508ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/silo-quotas
177272025-03-07T23:30:41.508ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silo-quotas
177282025-03-07T23:30:41.508ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65fc7023-648b-4b08-adeb-0be37326b5f6 uri = /v1/system/silo-quotas
177292025-03-07T23:30:41.508ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 212 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 65fc7023-648b-4b08-adeb-0be37326b5f6 response_code = 405 uri = /v1/system/silo-quotas
177302025-03-07T23:30:41.509ZINFOtest_unauthorized (external client test context): client received response status = 405
177312025-03-07T23:30:41.509ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/silo-quotas
177322025-03-07T23:30:41.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silo-quotas
177332025-03-07T23:30:41.509ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 72c85cce-8595-423c-86a7-2461c8903fe6 uri = /v1/system/silo-quotas
177342025-03-07T23:30:41.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 72c85cce-8595-423c-86a7-2461c8903fe6 response_code = 405 uri = /v1/system/silo-quotas
177352025-03-07T23:30:41.509ZINFOtest_unauthorized (external client test context): client received response status = 405
177362025-03-07T23:30:41.509ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/silo-quotas
177372025-03-07T23:30:41.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silo-quotas
177382025-03-07T23:30:41.509ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0a4531ab-60e9-4240-954e-8a5f51547911 uri = /v1/system/silo-quotas
177392025-03-07T23:30:41.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0a4531ab-60e9-4240-954e-8a5f51547911 response_code = 405 uri = /v1/system/silo-quotas
177402025-03-07T23:30:41.510ZINFOtest_unauthorized (external client test context): client received response status = 405
177412025-03-07T23:30:41.510ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/silo-quotas
177422025-03-07T23:30:41.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/silo-quotas
177432025-03-07T23:30:41.510ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fc4e7112-849e-4855-8b9f-94cc5ec33b89 uri = /v1/system/silo-quotas
177442025-03-07T23:30:41.510ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fc4e7112-849e-4855-8b9f-94cc5ec33b89 response_code = 405 uri = /v1/system/silo-quotas
177452025-03-07T23:30:41.510ZINFOtest_unauthorized (external client test context): client received response status = 405
177462025-03-07T23:30:41.510ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/silo-quotas
177472025-03-07T23:30:41.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177482025-03-07T23:30:41.510ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5a5191d0-bd01-4a21-ae91-0c938f6493a2 uri = /v1/system/silo-quotas
177492025-03-07T23:30:41.510ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5a5191d0-bd01-4a21-ae91-0c938f6493a2 response_code = 405 uri = /v1/system/silo-quotas
177502025-03-07T23:30:41.511ZINFOtest_unauthorized (external client test context): client received response status = 405
177512025-03-07T23:30:41.511ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/silo-quotas
177522025-03-07T23:30:41.511ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177532025-03-07T23:30:41.511ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dd67aabf-ef83-469e-a9f7-453cc5885262 uri = /v1/system/silo-quotas
177542025-03-07T23:30:41.511ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dd67aabf-ef83-469e-a9f7-453cc5885262 response_code = 405 uri = /v1/system/silo-quotas
177552025-03-07T23:30:41.511ZINFOtest_unauthorized (external client test context): client received response status = 405
177562025-03-07T23:30:41.511ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/silo-quotas
177572025-03-07T23:30:41.511ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177582025-03-07T23:30:41.512ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 43d12768-1b9c-4606-aa65-3bb1d8307000 uri = /v1/system/silo-quotas
177592025-03-07T23:30:41.512ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 43d12768-1b9c-4606-aa65-3bb1d8307000 response_code = 405 uri = /v1/system/silo-quotas
177602025-03-07T23:30:41.512ZINFOtest_unauthorized (external client test context): client received response status = 405
177612025-03-07T23:30:41.512ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/silo-quotas
177622025-03-07T23:30:41.512ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177632025-03-07T23:30:41.512ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 248c169a-d5af-484f-a257-6565e4165ad6 uri = /v1/system/silo-quotas
177642025-03-07T23:30:41.512ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 248c169a-d5af-484f-a257-6565e4165ad6 response_code = 405 uri = /v1/system/silo-quotas
177652025-03-07T23:30:41.512ZINFOtest_unauthorized (external client test context): client received response status = 405
177662025-03-07T23:30:41.513ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/silo-quotas
177672025-03-07T23:30:41.513ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177682025-03-07T23:30:41.513ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 878d8b28-7fdf-4aa6-9a9f-34dd59ac329f uri = /v1/system/silo-quotas
177692025-03-07T23:30:41.513ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 878d8b28-7fdf-4aa6-9a9f-34dd59ac329f response_code = 405 uri = /v1/system/silo-quotas
177702025-03-07T23:30:41.513ZINFOtest_unauthorized (external client test context): client received response status = 405
177712025-03-07T23:30:41.513ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/silo-quotas
177722025-03-07T23:30:41.513ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177732025-03-07T23:30:41.513ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4a9f8ca1-0b60-4d1d-8340-34fdf0fb14d1 uri = /v1/system/silo-quotas
177742025-03-07T23:30:41.513ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4a9f8ca1-0b60-4d1d-8340-34fdf0fb14d1 response_code = 405 uri = /v1/system/silo-quotas
177752025-03-07T23:30:41.514ZINFOtest_unauthorized (external client test context): client received response status = 405
177762025-03-07T23:30:41.514ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/silo-quotas
177772025-03-07T23:30:41.514ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177782025-03-07T23:30:41.514ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 804361d2-ced2-4797-963b-6cd9ddecf254 uri = /v1/system/silo-quotas
177792025-03-07T23:30:41.514ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 804361d2-ced2-4797-963b-6cd9ddecf254 response_code = 405 uri = /v1/system/silo-quotas
177802025-03-07T23:30:41.514ZINFOtest_unauthorized (external client test context): client received response status = 405
177812025-03-07T23:30:41.514ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/silo-quotas
177822025-03-07T23:30:41.514ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/silo-quotas
177832025-03-07T23:30:41.514ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3832707b-75f4-4945-8f2c-54695806799c uri = /v1/system/silo-quotas
177842025-03-07T23:30:41.515ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 349 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3832707b-75f4-4945-8f2c-54695806799c response_code = 405 uri = /v1/system/silo-quotas
177852025-03-07T23:30:41.515ZINFOtest_unauthorized (external client test context): client received response status = 405
177862025-03-07T23:30:41.515ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/silo-quotas
177872025-03-07T23:30:41.515ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/silo-quotas
177882025-03-07T23:30:41.515ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 uri = /v1/system/silo-quotas
177892025-03-07T23:30:41.515ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 uri = /v1/system/silo-quotas
177902025-03-07T23:30:41.515ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/silo-quotas
177912025-03-07T23:30:41.516ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177922025-03-07T23:30:41.516ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177932025-03-07T23:30:41.517ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177942025-03-07T23:30:41.529ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
177952025-03-07T23:30:41.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
177962025-03-07T23:30:41.529ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
177972025-03-07T23:30:41.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
177982025-03-07T23:30:41.537ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
177992025-03-07T23:30:41.537ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178002025-03-07T23:30:41.537ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178012025-03-07T23:30:41.538ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178022025-03-07T23:30:41.547ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
178032025-03-07T23:30:41.547ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178042025-03-07T23:30:41.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178052025-03-07T23:30:41.548ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178062025-03-07T23:30:41.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
178072025-03-07T23:30:41.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
178082025-03-07T23:30:41.565ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
178092025-03-07T23:30:41.565ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178102025-03-07T23:30:41.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178112025-03-07T23:30:41.566ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178122025-03-07T23:30:41.566ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
178132025-03-07T23:30:41.569ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
178142025-03-07T23:30:41.575ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
178152025-03-07T23:30:41.575ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
178162025-03-07T23:30:41.575ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
178172025-03-07T23:30:41.576ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
178182025-03-07T23:30:41.576ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
178192025-03-07T23:30:41.576ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178202025-03-07T23:30:41.577ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178212025-03-07T23:30:41.577ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178222025-03-07T23:30:41.581ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
178232025-03-07T23:30:41.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178242025-03-07T23:30:41.582ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178252025-03-07T23:30:41.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178262025-03-07T23:30:41.592ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
178272025-03-07T23:30:41.596ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
178282025-03-07T23:30:41.596ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 uri = /v1/system/silo-quotas
178292025-03-07T23:30:41.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource = Fleet uri = /v1/system/silo-quotas
178302025-03-07T23:30:41.596ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/silo-quotas
178312025-03-07T23:30:41.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource = Database uri = /v1/system/silo-quotas
178322025-03-07T23:30:41.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
178332025-03-07T23:30:41.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource = Database result = Ok(()) uri = /v1/system/silo-quotas
178342025-03-07T23:30:41.600ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/silo-quotas
178352025-03-07T23:30:41.608ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource = Fleet result = Ok(()) uri = /v1/system/silo-quotas
178362025-03-07T23:30:41.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource = Database uri = /v1/system/silo-quotas
178372025-03-07T23:30:41.608ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 roles = RoleSet { roles: {} } uri = /v1/system/silo-quotas
178382025-03-07T23:30:41.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 resource = Database result = Ok(()) uri = /v1/system/silo-quotas
178392025-03-07T23:30:41.613ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 97749 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44fb5891-5aff-4f92-a4f0-3916629d5772 response_code = 200 uri = /v1/system/silo-quotas
178402025-03-07T23:30:41.614ZINFOtest_unauthorized (external client test context): client received response status = 200
178412025-03-07T23:30:41.615ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/utilization/silos
178422025-03-07T23:30:41.615ZINFOtest_unauthorized: test: privileged GET url = /v1/system/utilization/silos
178432025-03-07T23:30:41.615ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos
178442025-03-07T23:30:41.615ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 uri = /v1/system/utilization/silos
178452025-03-07T23:30:41.615ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 uri = /v1/system/utilization/silos
178462025-03-07T23:30:41.615ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos
178472025-03-07T23:30:41.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178482025-03-07T23:30:41.616ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178492025-03-07T23:30:41.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178502025-03-07T23:30:41.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178512025-03-07T23:30:41.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178522025-03-07T23:30:41.621ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178532025-03-07T23:30:41.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
178542025-03-07T23:30:41.623ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
178552025-03-07T23:30:41.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178562025-03-07T23:30:41.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178572025-03-07T23:30:41.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178582025-03-07T23:30:41.626ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
178592025-03-07T23:30:41.626ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178602025-03-07T23:30:41.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178612025-03-07T23:30:41.626ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178622025-03-07T23:30:41.628ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
178632025-03-07T23:30:41.632ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
178642025-03-07T23:30:41.632ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178652025-03-07T23:30:41.632ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178662025-03-07T23:30:41.632ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178672025-03-07T23:30:41.635ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
178682025-03-07T23:30:41.635ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
178692025-03-07T23:30:41.635ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178702025-03-07T23:30:41.635ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178712025-03-07T23:30:41.635ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178722025-03-07T23:30:41.637ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
178732025-03-07T23:30:41.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178742025-03-07T23:30:41.637ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178752025-03-07T23:30:41.638ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178762025-03-07T23:30:41.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
178772025-03-07T23:30:41.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
178782025-03-07T23:30:41.643ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 uri = /v1/system/utilization/silos
178792025-03-07T23:30:41.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource = Fleet uri = /v1/system/utilization/silos
178802025-03-07T23:30:41.643ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos
178812025-03-07T23:30:41.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource = Database uri = /v1/system/utilization/silos
178822025-03-07T23:30:41.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
178832025-03-07T23:30:41.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
178842025-03-07T23:30:41.647ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos
178852025-03-07T23:30:41.656ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource = Fleet result = Ok(()) uri = /v1/system/utilization/silos
178862025-03-07T23:30:41.656ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource = Database uri = /v1/system/utilization/silos
178872025-03-07T23:30:41.656ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
178882025-03-07T23:30:41.657ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
178892025-03-07T23:30:41.665ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 49965 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 138307bd-fb4d-4f45-9843-73a5510dc926 response_code = 200 uri = /v1/system/utilization/silos
178902025-03-07T23:30:41.666ZINFOtest_unauthorized (external client test context): client received response status = 200
178912025-03-07T23:30:41.666ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/utilization/silos
178922025-03-07T23:30:41.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos
178932025-03-07T23:30:41.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 uri = /v1/system/utilization/silos
178942025-03-07T23:30:41.667ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 uri = /v1/system/utilization/silos
178952025-03-07T23:30:41.667ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/utilization/silos
178962025-03-07T23:30:41.667ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
178972025-03-07T23:30:41.667ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
178982025-03-07T23:30:41.668ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
178992025-03-07T23:30:41.671ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179002025-03-07T23:30:41.671ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179012025-03-07T23:30:41.671ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179022025-03-07T23:30:41.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
179032025-03-07T23:30:41.675ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
179042025-03-07T23:30:41.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179052025-03-07T23:30:41.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179062025-03-07T23:30:41.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179072025-03-07T23:30:41.684ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
179082025-03-07T23:30:41.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179092025-03-07T23:30:41.684ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179102025-03-07T23:30:41.685ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179112025-03-07T23:30:41.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
179122025-03-07T23:30:41.692ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
179132025-03-07T23:30:41.692ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179142025-03-07T23:30:41.692ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179152025-03-07T23:30:41.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179162025-03-07T23:30:41.696ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
179172025-03-07T23:30:41.697ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
179182025-03-07T23:30:41.697ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179192025-03-07T23:30:41.697ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179202025-03-07T23:30:41.697ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179212025-03-07T23:30:41.700ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
179222025-03-07T23:30:41.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
179232025-03-07T23:30:41.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
179242025-03-07T23:30:41.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
179252025-03-07T23:30:41.703ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
179262025-03-07T23:30:41.707ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
179272025-03-07T23:30:41.707ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 uri = /v1/system/utilization/silos
179282025-03-07T23:30:41.707ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 resource = Fleet uri = /v1/system/utilization/silos
179292025-03-07T23:30:41.707ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos
179302025-03-07T23:30:41.707ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 resource = Database uri = /v1/system/utilization/silos
179312025-03-07T23:30:41.707ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
179322025-03-07T23:30:41.708ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
179332025-03-07T23:30:41.712ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
179342025-03-07T23:30:41.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 resource = Fleet result = Err(Forbidden) uri = /v1/system/utilization/silos
179352025-03-07T23:30:41.738ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 71751 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c0d1cfdf-b195-4025-aeb6-15a91b97b930 response_code = 403 uri = /v1/system/utilization/silos
179362025-03-07T23:30:41.740ZINFOtest_unauthorized (external client test context): client received response status = 403
179372025-03-07T23:30:41.740ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/utilization/silos
179382025-03-07T23:30:41.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos
179392025-03-07T23:30:41.740ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f uri = /v1/system/utilization/silos
179402025-03-07T23:30:41.741ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f uri = /v1/system/utilization/silos
179412025-03-07T23:30:41.741ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f uri = /v1/system/utilization/silos
179422025-03-07T23:30:41.741ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f uri = /v1/system/utilization/silos
179432025-03-07T23:30:41.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f resource = Fleet uri = /v1/system/utilization/silos
179442025-03-07T23:30:41.741ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
179452025-03-07T23:30:41.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f resource = Fleet result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/utilization/silos
179462025-03-07T23:30:41.742ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 2241 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b98bd680-4053-45df-aab9-3f6f70fc195f response_code = 401 uri = /v1/system/utilization/silos
179472025-03-07T23:30:41.743ZINFOtest_unauthorized (external client test context): client received response status = 401
179482025-03-07T23:30:41.744ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/utilization/silos
179492025-03-07T23:30:41.744ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos
179502025-03-07T23:30:41.745ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17345c76-ad17-4037-abe8-caa7a4a1fab3 uri = /v1/system/utilization/silos
179512025-03-07T23:30:41.745ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17345c76-ad17-4037-abe8-caa7a4a1fab3 uri = /v1/system/utilization/silos
179522025-03-07T23:30:41.745ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17345c76-ad17-4037-abe8-caa7a4a1fab3 uri = /v1/system/utilization/silos
179532025-03-07T23:30:41.745ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 195 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 17345c76-ad17-4037-abe8-caa7a4a1fab3 response_code = 401 uri = /v1/system/utilization/silos
179542025-03-07T23:30:41.750ZINFOtest_unauthorized (external client test context): client received response status = 401
179552025-03-07T23:30:41.750ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/utilization/silos
179562025-03-07T23:30:41.750ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos
179572025-03-07T23:30:41.769ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8d4e192f-0703-4476-a9bb-99fed894c407 uri = /v1/system/utilization/silos
179582025-03-07T23:30:41.769ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8d4e192f-0703-4476-a9bb-99fed894c407 uri = /v1/system/utilization/silos
179592025-03-07T23:30:41.769ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:286:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloUtilization>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:304:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloUtilization>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SiloUtilization>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8d4e192f-0703-4476-a9bb-99fed894c407 uri = /v1/system/utilization/silos
179602025-03-07T23:30:41.769ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 6099 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8d4e192f-0703-4476-a9bb-99fed894c407 response_code = 401 uri = /v1/system/utilization/silos
179612025-03-07T23:30:41.769ZINFOtest_unauthorized (external client test context): client received response status = 401
179622025-03-07T23:30:41.769ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/utilization/silos
179632025-03-07T23:30:41.769ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos
179642025-03-07T23:30:41.769ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 563fa5f2-2dfc-4473-96a9-f5f645626624 uri = /v1/system/utilization/silos
179652025-03-07T23:30:41.769ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 563fa5f2-2dfc-4473-96a9-f5f645626624 response_code = 405 uri = /v1/system/utilization/silos
179662025-03-07T23:30:41.769ZINFOtest_unauthorized (external client test context): client received response status = 405
179672025-03-07T23:30:41.769ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/utilization/silos
179682025-03-07T23:30:41.769ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos
179692025-03-07T23:30:41.769ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2c6acd1d-47b7-4ef1-988b-1d5971539e75 uri = /v1/system/utilization/silos
179702025-03-07T23:30:41.769ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2c6acd1d-47b7-4ef1-988b-1d5971539e75 response_code = 405 uri = /v1/system/utilization/silos
179712025-03-07T23:30:41.773ZINFOtest_unauthorized (external client test context): client received response status = 405
179722025-03-07T23:30:41.773ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/utilization/silos
179732025-03-07T23:30:41.773ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos
179742025-03-07T23:30:41.775ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5a9217dc-7c00-4d87-b436-9694c320c22f uri = /v1/system/utilization/silos
179752025-03-07T23:30:41.775ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5a9217dc-7c00-4d87-b436-9694c320c22f response_code = 405 uri = /v1/system/utilization/silos
179762025-03-07T23:30:41.777ZINFOtest_unauthorized (external client test context): client received response status = 405
179772025-03-07T23:30:41.777ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/utilization/silos
179782025-03-07T23:30:41.777ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos
179792025-03-07T23:30:41.779ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7365b741-7e28-417a-83b6-ec729e7f4fe1 uri = /v1/system/utilization/silos
179802025-03-07T23:30:41.779ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7365b741-7e28-417a-83b6-ec729e7f4fe1 response_code = 405 uri = /v1/system/utilization/silos
179812025-03-07T23:30:41.787ZINFOtest_unauthorized (external client test context): client received response status = 405
179822025-03-07T23:30:41.787ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/utilization/silos
179832025-03-07T23:30:41.787ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos
179842025-03-07T23:30:41.789ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93b1ab8f-552e-41f7-b554-3f5413017b24 uri = /v1/system/utilization/silos
179852025-03-07T23:30:41.789ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93b1ab8f-552e-41f7-b554-3f5413017b24 response_code = 405 uri = /v1/system/utilization/silos
179862025-03-07T23:30:41.791ZINFOtest_unauthorized (external client test context): client received response status = 405
179872025-03-07T23:30:41.791ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/utilization/silos
179882025-03-07T23:30:41.791ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos
179892025-03-07T23:30:41.791ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4e520b72-08fd-4e27-9d90-9e55049ce24c uri = /v1/system/utilization/silos
179902025-03-07T23:30:41.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4e520b72-08fd-4e27-9d90-9e55049ce24c response_code = 405 uri = /v1/system/utilization/silos
179912025-03-07T23:30:41.792ZINFOtest_unauthorized (external client test context): client received response status = 405
179922025-03-07T23:30:41.792ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/utilization/silos
179932025-03-07T23:30:41.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos
179942025-03-07T23:30:41.792ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0a25da-066c-4f10-8ec1-3e2f3b188193 uri = /v1/system/utilization/silos
179952025-03-07T23:30:41.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0a25da-066c-4f10-8ec1-3e2f3b188193 response_code = 405 uri = /v1/system/utilization/silos
179962025-03-07T23:30:41.792ZINFOtest_unauthorized (external client test context): client received response status = 405
179972025-03-07T23:30:41.792ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/utilization/silos
179982025-03-07T23:30:41.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos
179992025-03-07T23:30:41.792ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 42707803-fadd-403e-8ecc-b188ccecda2c uri = /v1/system/utilization/silos
180002025-03-07T23:30:41.792ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 42707803-fadd-403e-8ecc-b188ccecda2c response_code = 405 uri = /v1/system/utilization/silos
180012025-03-07T23:30:41.792ZINFOtest_unauthorized (external client test context): client received response status = 405
180022025-03-07T23:30:41.792ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/utilization/silos
180032025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180042025-03-07T23:30:41.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8bb5d61a-db5f-4a6c-b238-848633190306 uri = /v1/system/utilization/silos
180052025-03-07T23:30:41.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 79 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8bb5d61a-db5f-4a6c-b238-848633190306 response_code = 405 uri = /v1/system/utilization/silos
180062025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client received response status = 405
180072025-03-07T23:30:41.793ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/utilization/silos
180082025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180092025-03-07T23:30:41.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1543fd45-3834-4eef-9d67-f27e3b0181dd uri = /v1/system/utilization/silos
180102025-03-07T23:30:41.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1543fd45-3834-4eef-9d67-f27e3b0181dd response_code = 405 uri = /v1/system/utilization/silos
180112025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client received response status = 405
180122025-03-07T23:30:41.793ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/utilization/silos
180132025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180142025-03-07T23:30:41.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cc1d2397-b24d-47ae-a7b6-fd5b19f2b5e3 uri = /v1/system/utilization/silos
180152025-03-07T23:30:41.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cc1d2397-b24d-47ae-a7b6-fd5b19f2b5e3 response_code = 405 uri = /v1/system/utilization/silos
180162025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client received response status = 405
180172025-03-07T23:30:41.793ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/utilization/silos
180182025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180192025-03-07T23:30:41.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c77b845-0f22-43c6-b337-0365a7203d1f uri = /v1/system/utilization/silos
180202025-03-07T23:30:41.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c77b845-0f22-43c6-b337-0365a7203d1f response_code = 405 uri = /v1/system/utilization/silos
180212025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client received response status = 405
180222025-03-07T23:30:41.793ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/utilization/silos
180232025-03-07T23:30:41.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180242025-03-07T23:30:41.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fd1b7c50-8dad-4cb4-9749-33357e51a3ac uri = /v1/system/utilization/silos
180252025-03-07T23:30:41.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fd1b7c50-8dad-4cb4-9749-33357e51a3ac response_code = 405 uri = /v1/system/utilization/silos
180262025-03-07T23:30:41.794ZINFOtest_unauthorized (external client test context): client received response status = 405
180272025-03-07T23:30:41.794ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/utilization/silos
180282025-03-07T23:30:41.794ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180292025-03-07T23:30:41.794ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 90313304-a893-40a4-8ec7-c6b7b0ae3f05 uri = /v1/system/utilization/silos
180302025-03-07T23:30:41.794ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 90313304-a893-40a4-8ec7-c6b7b0ae3f05 response_code = 405 uri = /v1/system/utilization/silos
180312025-03-07T23:30:41.794ZINFOtest_unauthorized (external client test context): client received response status = 405
180322025-03-07T23:30:41.794ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/utilization/silos
180332025-03-07T23:30:41.794ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180342025-03-07T23:30:41.794ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 83afc2ae-676f-4eef-b78c-c804cb9e1b87 uri = /v1/system/utilization/silos
180352025-03-07T23:30:41.794ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 83afc2ae-676f-4eef-b78c-c804cb9e1b87 response_code = 405 uri = /v1/system/utilization/silos
180362025-03-07T23:30:41.795ZINFOtest_unauthorized (external client test context): client received response status = 405
180372025-03-07T23:30:41.795ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/utilization/silos
180382025-03-07T23:30:41.795ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos
180392025-03-07T23:30:41.795ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4e4488ae-79fc-4aef-90d4-fc11a182d0bb uri = /v1/system/utilization/silos
180402025-03-07T23:30:41.795ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4e4488ae-79fc-4aef-90d4-fc11a182d0bb response_code = 405 uri = /v1/system/utilization/silos
180412025-03-07T23:30:41.796ZINFOtest_unauthorized (external client test context): client received response status = 405
180422025-03-07T23:30:41.796ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/utilization/silos
180432025-03-07T23:30:41.796ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos
180442025-03-07T23:30:41.796ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 uri = /v1/system/utilization/silos
180452025-03-07T23:30:41.796ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 uri = /v1/system/utilization/silos
180462025-03-07T23:30:41.796ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos
180472025-03-07T23:30:41.796ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180482025-03-07T23:30:41.796ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180492025-03-07T23:30:41.797ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180502025-03-07T23:30:41.800ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180512025-03-07T23:30:41.800ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180522025-03-07T23:30:41.801ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180532025-03-07T23:30:41.803ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
180542025-03-07T23:30:41.803ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
180552025-03-07T23:30:41.803ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180562025-03-07T23:30:41.803ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180572025-03-07T23:30:41.804ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180582025-03-07T23:30:41.807ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
180592025-03-07T23:30:41.807ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180602025-03-07T23:30:41.807ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180612025-03-07T23:30:41.808ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180622025-03-07T23:30:41.810ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
180632025-03-07T23:30:41.814ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
180642025-03-07T23:30:41.814ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180652025-03-07T23:30:41.814ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180662025-03-07T23:30:41.815ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180672025-03-07T23:30:41.816ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
180682025-03-07T23:30:41.817ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
180692025-03-07T23:30:41.817ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180702025-03-07T23:30:41.817ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180712025-03-07T23:30:41.817ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180722025-03-07T23:30:41.819ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
180732025-03-07T23:30:41.819ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
180742025-03-07T23:30:41.819ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
180752025-03-07T23:30:41.820ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
180762025-03-07T23:30:41.820ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
180772025-03-07T23:30:41.821ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
180782025-03-07T23:30:41.821ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
180792025-03-07T23:30:41.821ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
180802025-03-07T23:30:41.822ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
180812025-03-07T23:30:41.822ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
180822025-03-07T23:30:41.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
180832025-03-07T23:30:41.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
180842025-03-07T23:30:41.827ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 uri = /v1/system/utilization/silos
180852025-03-07T23:30:41.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource = Fleet uri = /v1/system/utilization/silos
180862025-03-07T23:30:41.827ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos
180872025-03-07T23:30:41.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource = Database uri = /v1/system/utilization/silos
180882025-03-07T23:30:41.827ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
180892025-03-07T23:30:41.827ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
180902025-03-07T23:30:41.831ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos
180912025-03-07T23:30:41.836ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource = Fleet result = Ok(()) uri = /v1/system/utilization/silos
180922025-03-07T23:30:41.836ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource = Database uri = /v1/system/utilization/silos
180932025-03-07T23:30:41.836ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos
180942025-03-07T23:30:41.836ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 resource = Database result = Ok(()) uri = /v1/system/utilization/silos
180952025-03-07T23:30:41.843ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 44864 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f5ca21fc-d68d-4e4c-a7d7-2babf41f5b14 response_code = 200 uri = /v1/system/utilization/silos
180962025-03-07T23:30:41.843ZINFOtest_unauthorized (external client test context): client received response status = 200
180972025-03-07T23:30:41.843ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/utilization/silos/demo-silo
180982025-03-07T23:30:41.843ZINFOtest_unauthorized: test: privileged GET url = /v1/system/utilization/silos/demo-silo
180992025-03-07T23:30:41.843ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
181002025-03-07T23:30:41.843ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 uri = /v1/system/utilization/silos/demo-silo
181012025-03-07T23:30:41.843ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 uri = /v1/system/utilization/silos/demo-silo
181022025-03-07T23:30:41.843ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos/demo-silo
181032025-03-07T23:30:41.843ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181042025-03-07T23:30:41.843ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181052025-03-07T23:30:41.845ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181062025-03-07T23:30:41.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181072025-03-07T23:30:41.848ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181082025-03-07T23:30:41.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181092025-03-07T23:30:41.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
181102025-03-07T23:30:41.851ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
181112025-03-07T23:30:41.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181122025-03-07T23:30:41.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181132025-03-07T23:30:41.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181142025-03-07T23:30:41.854ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
181152025-03-07T23:30:41.854ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181162025-03-07T23:30:41.854ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181172025-03-07T23:30:41.854ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181182025-03-07T23:30:41.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
181192025-03-07T23:30:41.865ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
181202025-03-07T23:30:41.865ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181212025-03-07T23:30:41.865ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181222025-03-07T23:30:41.866ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181232025-03-07T23:30:41.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
181242025-03-07T23:30:41.869ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
181252025-03-07T23:30:41.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181262025-03-07T23:30:41.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181272025-03-07T23:30:41.869ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181282025-03-07T23:30:41.874ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
181292025-03-07T23:30:41.875ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181302025-03-07T23:30:41.875ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181312025-03-07T23:30:41.875ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181322025-03-07T23:30:41.883ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
181332025-03-07T23:30:41.883ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
181342025-03-07T23:30:41.883ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 uri = /v1/system/utilization/silos/demo-silo
181352025-03-07T23:30:41.883ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database uri = /v1/system/utilization/silos/demo-silo
181362025-03-07T23:30:41.884ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
181372025-03-07T23:30:41.884ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181382025-03-07T23:30:41.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
181392025-03-07T23:30:41.885ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
181402025-03-07T23:30:41.886ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database uri = /v1/system/utilization/silos/demo-silo
181412025-03-07T23:30:41.886ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
181422025-03-07T23:30:41.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181432025-03-07T23:30:41.896ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
181442025-03-07T23:30:41.896ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database uri = /v1/system/utilization/silos/demo-silo
181452025-03-07T23:30:41.896ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
181462025-03-07T23:30:41.897ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181472025-03-07T23:30:41.902ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
181482025-03-07T23:30:41.912ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181492025-03-07T23:30:41.912ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
181502025-03-07T23:30:41.912ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
181512025-03-07T23:30:41.912ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database uri = /v1/system/utilization/silos/demo-silo
181522025-03-07T23:30:41.912ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
181532025-03-07T23:30:41.912ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181542025-03-07T23:30:41.915ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
181552025-03-07T23:30:41.915ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database uri = /v1/system/utilization/silos/demo-silo
181562025-03-07T23:30:41.915ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
181572025-03-07T23:30:41.916ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181582025-03-07T23:30:41.919ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
181592025-03-07T23:30:41.932ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181602025-03-07T23:30:41.932ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database uri = /v1/system/utilization/silos/demo-silo
181612025-03-07T23:30:41.932ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
181622025-03-07T23:30:41.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
181632025-03-07T23:30:41.939ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 96641 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee4c0ff2-0ddc-4f86-95df-41f3e0c5e0a3 response_code = 200 uri = /v1/system/utilization/silos/demo-silo
181642025-03-07T23:30:41.940ZINFOtest_unauthorized (external client test context): client received response status = 200
181652025-03-07T23:30:41.943ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/utilization/silos/demo-silo
181662025-03-07T23:30:41.944ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
181672025-03-07T23:30:41.944ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 uri = /v1/system/utilization/silos/demo-silo
181682025-03-07T23:30:41.944ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 uri = /v1/system/utilization/silos/demo-silo
181692025-03-07T23:30:41.944ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/utilization/silos/demo-silo
181702025-03-07T23:30:41.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181712025-03-07T23:30:41.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181722025-03-07T23:30:41.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181732025-03-07T23:30:41.947ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181742025-03-07T23:30:41.947ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181752025-03-07T23:30:41.948ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181762025-03-07T23:30:41.952ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
181772025-03-07T23:30:41.953ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
181782025-03-07T23:30:41.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181792025-03-07T23:30:41.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181802025-03-07T23:30:41.953ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181812025-03-07T23:30:41.956ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
181822025-03-07T23:30:41.956ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181832025-03-07T23:30:41.956ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181842025-03-07T23:30:41.956ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181852025-03-07T23:30:41.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
181862025-03-07T23:30:41.968ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
181872025-03-07T23:30:41.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181882025-03-07T23:30:41.968ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181892025-03-07T23:30:41.968ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181902025-03-07T23:30:41.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
181912025-03-07T23:30:41.974ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
181922025-03-07T23:30:41.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181932025-03-07T23:30:41.974ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181942025-03-07T23:30:41.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181952025-03-07T23:30:41.976ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
181962025-03-07T23:30:41.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
181972025-03-07T23:30:41.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
181982025-03-07T23:30:41.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
181992025-03-07T23:30:41.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
182002025-03-07T23:30:41.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
182012025-03-07T23:30:41.982ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 uri = /v1/system/utilization/silos/demo-silo
182022025-03-07T23:30:41.982ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Database uri = /v1/system/utilization/silos/demo-silo
182032025-03-07T23:30:41.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182042025-03-07T23:30:41.982ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182052025-03-07T23:30:41.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
182062025-03-07T23:30:41.985ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
182072025-03-07T23:30:41.986ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Database uri = /v1/system/utilization/silos/demo-silo
182082025-03-07T23:30:41.986ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182092025-03-07T23:30:41.986ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182102025-03-07T23:30:41.990ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
182112025-03-07T23:30:41.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Database uri = /v1/system/utilization/silos/demo-silo
182122025-03-07T23:30:41.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182132025-03-07T23:30:41.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
182142025-03-07T23:30:41.994ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182152025-03-07T23:30:42.004ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Err(ObjectNotFound { type_name: Silo, lookup_type: ByName("demo-silo") }) uri = /v1/system/utilization/silos/demo-silo
182162025-03-07T23:30:42.004ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo with name "demo-silo" error_message_internal = not found: silo with name "demo-silo" latency_us = 64194 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 09fd0797-d13b-4f0d-a6fd-35ea8a4c0476 response_code = 404 uri = /v1/system/utilization/silos/demo-silo
182172025-03-07T23:30:42.005ZINFOtest_unauthorized (external client test context): client received response status = 404
182182025-03-07T23:30:42.005ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/utilization/silos/demo-silo
182192025-03-07T23:30:42.005ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182202025-03-07T23:30:42.005ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 uri = /v1/system/utilization/silos/demo-silo
182212025-03-07T23:30:42.006ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 uri = /v1/system/utilization/silos/demo-silo
182222025-03-07T23:30:42.006ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 uri = /v1/system/utilization/silos/demo-silo
182232025-03-07T23:30:42.006ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 uri = /v1/system/utilization/silos/demo-silo
182242025-03-07T23:30:42.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 resource = Database uri = /v1/system/utilization/silos/demo-silo
182252025-03-07T23:30:42.006ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
182262025-03-07T23:30:42.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/utilization/silos/demo-silo
182272025-03-07T23:30:42.006ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 630 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de8cc56d-0943-4e8b-98c6-36f32c2f13c2 response_code = 401 uri = /v1/system/utilization/silos/demo-silo
182282025-03-07T23:30:42.006ZINFOtest_unauthorized (external client test context): client received response status = 401
182292025-03-07T23:30:42.006ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/utilization/silos/demo-silo
182302025-03-07T23:30:42.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182312025-03-07T23:30:42.006ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fc9e1a9-2414-4ba6-9745-e81245602ba4 uri = /v1/system/utilization/silos/demo-silo
182322025-03-07T23:30:42.006ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fc9e1a9-2414-4ba6-9745-e81245602ba4 uri = /v1/system/utilization/silos/demo-silo
182332025-03-07T23:30:42.007ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fc9e1a9-2414-4ba6-9745-e81245602ba4 uri = /v1/system/utilization/silos/demo-silo
182342025-03-07T23:30:42.008ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 158 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0fc9e1a9-2414-4ba6-9745-e81245602ba4 response_code = 401 uri = /v1/system/utilization/silos/demo-silo
182352025-03-07T23:30:42.008ZINFOtest_unauthorized (external client test context): client received response status = 401
182362025-03-07T23:30:42.008ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/utilization/silos/demo-silo
182372025-03-07T23:30:42.008ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182382025-03-07T23:30:42.008ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 247aab1b-44a5-4d40-9bea-f13921992a31 uri = /v1/system/utilization/silos/demo-silo
182392025-03-07T23:30:42.008ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 247aab1b-44a5-4d40-9bea-f13921992a31 uri = /v1/system/utilization/silos/demo-silo
182402025-03-07T23:30:42.009ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:258:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloUtilization>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:270:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloUtilization>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_utilization_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SiloPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::SiloUtilization>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 247aab1b-44a5-4d40-9bea-f13921992a31 uri = /v1/system/utilization/silos/demo-silo
182412025-03-07T23:30:42.009ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2168 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 247aab1b-44a5-4d40-9bea-f13921992a31 response_code = 401 uri = /v1/system/utilization/silos/demo-silo
182422025-03-07T23:30:42.009ZINFOtest_unauthorized (external client test context): client received response status = 401
182432025-03-07T23:30:42.009ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/utilization/silos/demo-silo
182442025-03-07T23:30:42.010ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182452025-03-07T23:30:42.010ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 15972655-cccc-4e1c-be9a-3cde7d4f1813 uri = /v1/system/utilization/silos/demo-silo
182462025-03-07T23:30:42.010ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 163 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 15972655-cccc-4e1c-be9a-3cde7d4f1813 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182472025-03-07T23:30:42.011ZINFOtest_unauthorized (external client test context): client received response status = 405
182482025-03-07T23:30:42.011ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/utilization/silos/demo-silo
182492025-03-07T23:30:42.011ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182502025-03-07T23:30:42.011ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b0e54bc1-c861-45b6-bbae-ad0dcdd0a081 uri = /v1/system/utilization/silos/demo-silo
182512025-03-07T23:30:42.011ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b0e54bc1-c861-45b6-bbae-ad0dcdd0a081 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182522025-03-07T23:30:42.011ZINFOtest_unauthorized (external client test context): client received response status = 405
182532025-03-07T23:30:42.011ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/utilization/silos/demo-silo
182542025-03-07T23:30:42.011ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182552025-03-07T23:30:42.011ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7be1e527-fc68-453b-bb4c-fbf73727e433 uri = /v1/system/utilization/silos/demo-silo
182562025-03-07T23:30:42.012ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7be1e527-fc68-453b-bb4c-fbf73727e433 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182572025-03-07T23:30:42.012ZINFOtest_unauthorized (external client test context): client received response status = 405
182582025-03-07T23:30:42.012ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/utilization/silos/demo-silo
182592025-03-07T23:30:42.012ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182602025-03-07T23:30:42.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 06d0dffb-e775-4752-bbd6-18baf1c008d9 uri = /v1/system/utilization/silos/demo-silo
182612025-03-07T23:30:42.013ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 06d0dffb-e775-4752-bbd6-18baf1c008d9 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182622025-03-07T23:30:42.013ZINFOtest_unauthorized (external client test context): client received response status = 405
182632025-03-07T23:30:42.013ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/utilization/silos/demo-silo
182642025-03-07T23:30:42.013ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182652025-03-07T23:30:42.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1b69af2a-0ea9-4965-851a-d4fbbca1efff uri = /v1/system/utilization/silos/demo-silo
182662025-03-07T23:30:42.013ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1b69af2a-0ea9-4965-851a-d4fbbca1efff response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182672025-03-07T23:30:42.014ZINFOtest_unauthorized (external client test context): client received response status = 405
182682025-03-07T23:30:42.014ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/utilization/silos/demo-silo
182692025-03-07T23:30:42.014ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182702025-03-07T23:30:42.014ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63942646-f454-4049-9c97-8cff785f44da uri = /v1/system/utilization/silos/demo-silo
182712025-03-07T23:30:42.014ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63942646-f454-4049-9c97-8cff785f44da response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182722025-03-07T23:30:42.014ZINFOtest_unauthorized (external client test context): client received response status = 405
182732025-03-07T23:30:42.014ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/utilization/silos/demo-silo
182742025-03-07T23:30:42.014ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182752025-03-07T23:30:42.014ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d659a8be-5daf-4c30-99b2-1df2275c68da uri = /v1/system/utilization/silos/demo-silo
182762025-03-07T23:30:42.014ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d659a8be-5daf-4c30-99b2-1df2275c68da response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182772025-03-07T23:30:42.014ZINFOtest_unauthorized (external client test context): client received response status = 405
182782025-03-07T23:30:42.015ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/utilization/silos/demo-silo
182792025-03-07T23:30:42.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182802025-03-07T23:30:42.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3bc59e5-0cb0-4415-96d1-0f12ec648732 uri = /v1/system/utilization/silos/demo-silo
182812025-03-07T23:30:42.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3bc59e5-0cb0-4415-96d1-0f12ec648732 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182822025-03-07T23:30:42.015ZINFOtest_unauthorized (external client test context): client received response status = 405
182832025-03-07T23:30:42.015ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/utilization/silos/demo-silo
182842025-03-07T23:30:42.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182852025-03-07T23:30:42.015ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a51e73d2-286b-48fb-a749-98c5dd1b8327 uri = /v1/system/utilization/silos/demo-silo
182862025-03-07T23:30:42.015ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a51e73d2-286b-48fb-a749-98c5dd1b8327 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182872025-03-07T23:30:42.015ZINFOtest_unauthorized (external client test context): client received response status = 405
182882025-03-07T23:30:42.015ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/utilization/silos/demo-silo
182892025-03-07T23:30:42.015ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182902025-03-07T23:30:42.016ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3fd2d11a-3f31-4e89-8ca6-8b98dce58b26 uri = /v1/system/utilization/silos/demo-silo
182912025-03-07T23:30:42.016ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3fd2d11a-3f31-4e89-8ca6-8b98dce58b26 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182922025-03-07T23:30:42.016ZINFOtest_unauthorized (external client test context): client received response status = 405
182932025-03-07T23:30:42.016ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/utilization/silos/demo-silo
182942025-03-07T23:30:42.016ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
182952025-03-07T23:30:42.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bc133e3d-1b4f-4f20-99ad-a4ace7ae7c3b uri = /v1/system/utilization/silos/demo-silo
182962025-03-07T23:30:42.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bc133e3d-1b4f-4f20-99ad-a4ace7ae7c3b response_code = 405 uri = /v1/system/utilization/silos/demo-silo
182972025-03-07T23:30:42.017ZINFOtest_unauthorized (external client test context): client received response status = 405
182982025-03-07T23:30:42.017ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/utilization/silos/demo-silo
182992025-03-07T23:30:42.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
183002025-03-07T23:30:42.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d20022b7-13dc-42a3-b497-52f3a01acd71 uri = /v1/system/utilization/silos/demo-silo
183012025-03-07T23:30:42.017ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d20022b7-13dc-42a3-b497-52f3a01acd71 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
183022025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client received response status = 405
183032025-03-07T23:30:42.018ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/utilization/silos/demo-silo
183042025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
183052025-03-07T23:30:42.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 26a27f6c-5269-4894-8905-4d025119a392 uri = /v1/system/utilization/silos/demo-silo
183062025-03-07T23:30:42.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 26a27f6c-5269-4894-8905-4d025119a392 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
183072025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client received response status = 405
183082025-03-07T23:30:42.018ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/utilization/silos/demo-silo
183092025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
183102025-03-07T23:30:42.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c6fd3197-ad15-4949-9207-78d081609b2f uri = /v1/system/utilization/silos/demo-silo
183112025-03-07T23:30:42.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c6fd3197-ad15-4949-9207-78d081609b2f response_code = 405 uri = /v1/system/utilization/silos/demo-silo
183122025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client received response status = 405
183132025-03-07T23:30:42.018ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/utilization/silos/demo-silo
183142025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
183152025-03-07T23:30:42.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1ec2bd31-c2f0-4c70-935b-8a58b8cdbf80 uri = /v1/system/utilization/silos/demo-silo
183162025-03-07T23:30:42.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1ec2bd31-c2f0-4c70-935b-8a58b8cdbf80 response_code = 405 uri = /v1/system/utilization/silos/demo-silo
183172025-03-07T23:30:42.018ZINFOtest_unauthorized (external client test context): client received response status = 405
183182025-03-07T23:30:42.019ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/utilization/silos/demo-silo
183192025-03-07T23:30:42.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
183202025-03-07T23:30:42.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c087252f-d210-41b8-98ef-a1721ad7ee5d uri = /v1/system/utilization/silos/demo-silo
183212025-03-07T23:30:42.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c087252f-d210-41b8-98ef-a1721ad7ee5d response_code = 405 uri = /v1/system/utilization/silos/demo-silo
183222025-03-07T23:30:42.019ZINFOtest_unauthorized (external client test context): client received response status = 405
183232025-03-07T23:30:42.019ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/utilization/silos/demo-silo
183242025-03-07T23:30:42.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/utilization/silos/demo-silo
183252025-03-07T23:30:42.019ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 uri = /v1/system/utilization/silos/demo-silo
183262025-03-07T23:30:42.019ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 uri = /v1/system/utilization/silos/demo-silo
183272025-03-07T23:30:42.019ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/utilization/silos/demo-silo
183282025-03-07T23:30:42.019ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183292025-03-07T23:30:42.019ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183302025-03-07T23:30:42.020ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183312025-03-07T23:30:42.027ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183322025-03-07T23:30:42.027ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183332025-03-07T23:30:42.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183342025-03-07T23:30:42.036ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
183352025-03-07T23:30:42.037ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
183362025-03-07T23:30:42.037ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183372025-03-07T23:30:42.037ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183382025-03-07T23:30:42.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183392025-03-07T23:30:42.049ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
183402025-03-07T23:30:42.049ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183412025-03-07T23:30:42.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183422025-03-07T23:30:42.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183432025-03-07T23:30:42.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
183442025-03-07T23:30:42.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
183452025-03-07T23:30:42.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183462025-03-07T23:30:42.061ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183472025-03-07T23:30:42.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183482025-03-07T23:30:42.073ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
183492025-03-07T23:30:42.074ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
183502025-03-07T23:30:42.074ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183512025-03-07T23:30:42.074ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183522025-03-07T23:30:42.075ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183532025-03-07T23:30:42.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
183542025-03-07T23:30:42.079ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
183552025-03-07T23:30:42.079ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
183562025-03-07T23:30:42.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
183572025-03-07T23:30:42.101ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
183582025-03-07T23:30:42.112ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
183592025-03-07T23:30:42.112ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 uri = /v1/system/utilization/silos/demo-silo
183602025-03-07T23:30:42.112ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database uri = /v1/system/utilization/silos/demo-silo
183612025-03-07T23:30:42.113ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
183622025-03-07T23:30:42.117ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183632025-03-07T23:30:42.128ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
183642025-03-07T23:30:42.128ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
183652025-03-07T23:30:42.128ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database uri = /v1/system/utilization/silos/demo-silo
183662025-03-07T23:30:42.128ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
183672025-03-07T23:30:42.171ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183682025-03-07T23:30:42.171ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
183692025-03-07T23:30:42.173ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
183702025-03-07T23:30:42.173ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
183712025-03-07T23:30:42.173ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
183722025-03-07T23:30:42.176ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
183732025-03-07T23:30:42.176ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database uri = /v1/system/utilization/silos/demo-silo
183742025-03-07T23:30:42.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
183752025-03-07T23:30:42.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183762025-03-07T23:30:42.180ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
183772025-03-07T23:30:42.180ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
183782025-03-07T23:30:42.185ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
183792025-03-07T23:30:42.215ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183802025-03-07T23:30:42.215ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } uri = /v1/system/utilization/silos/demo-silo
183812025-03-07T23:30:42.216ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource_id = 3eb64c19-f07d-4328-aa21-1cd58fef44c0 resource_type = Silo uri = /v1/system/utilization/silos/demo-silo
183822025-03-07T23:30:42.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database uri = /v1/system/utilization/silos/demo-silo
183832025-03-07T23:30:42.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
183842025-03-07T23:30:42.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183852025-03-07T23:30:42.218ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
183862025-03-07T23:30:42.219ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
183872025-03-07T23:30:42.221ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/utilization/silos/demo-silo
183882025-03-07T23:30:42.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database uri = /v1/system/utilization/silos/demo-silo
183892025-03-07T23:30:42.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
183902025-03-07T23:30:42.222ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183912025-03-07T23:30:42.227ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/utilization/silos/demo-silo
183922025-03-07T23:30:42.251ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Silo { parent: Fleet, key: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, lookup_type: ByName("demo-silo") } result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183932025-03-07T23:30:42.251ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database uri = /v1/system/utilization/silos/demo-silo
183942025-03-07T23:30:42.251ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 roles = RoleSet { roles: {} } uri = /v1/system/utilization/silos/demo-silo
183952025-03-07T23:30:42.251ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 resource = Database result = Ok(()) uri = /v1/system/utilization/silos/demo-silo
183962025-03-07T23:30:42.259ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 240453 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 81111ccb-2f37-4ea5-b4e2-fe338270d071 response_code = 200 uri = /v1/system/utilization/silos/demo-silo
183972025-03-07T23:30:42.262ZINFOtest_unauthorized (external client test context): client received response status = 200
183982025-03-07T23:30:42.262ZINFOtest_unauthorized: test: begin endpoint url = /v1/utilization
183992025-03-07T23:30:42.262ZINFOtest_unauthorized: test: privileged GET url = /v1/utilization
184002025-03-07T23:30:42.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/utilization
184012025-03-07T23:30:42.262ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 uri = /v1/utilization
184022025-03-07T23:30:42.262ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 uri = /v1/utilization
184032025-03-07T23:30:42.262ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/utilization
184042025-03-07T23:30:42.262ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184052025-03-07T23:30:42.262ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184062025-03-07T23:30:42.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184072025-03-07T23:30:42.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184082025-03-07T23:30:42.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184092025-03-07T23:30:42.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184102025-03-07T23:30:42.274ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
184112025-03-07T23:30:42.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
184122025-03-07T23:30:42.274ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
184132025-03-07T23:30:42.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184142025-03-07T23:30:42.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184152025-03-07T23:30:42.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184162025-03-07T23:30:42.277ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
184172025-03-07T23:30:42.277ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184182025-03-07T23:30:42.277ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184192025-03-07T23:30:42.277ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184202025-03-07T23:30:42.282ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
184212025-03-07T23:30:42.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
184222025-03-07T23:30:42.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184232025-03-07T23:30:42.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184242025-03-07T23:30:42.288ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184252025-03-07T23:30:42.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
184262025-03-07T23:30:42.293ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
184272025-03-07T23:30:42.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184282025-03-07T23:30:42.293ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184292025-03-07T23:30:42.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184302025-03-07T23:30:42.300ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
184312025-03-07T23:30:42.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
184322025-03-07T23:30:42.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
184332025-03-07T23:30:42.301ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
184342025-03-07T23:30:42.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
184352025-03-07T23:30:42.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
184362025-03-07T23:30:42.332ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 uri = /v1/utilization
184372025-03-07T23:30:42.332ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database uri = /v1/utilization
184382025-03-07T23:30:42.332ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {} } uri = /v1/utilization
184392025-03-07T23:30:42.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database result = Ok(()) uri = /v1/utilization
184402025-03-07T23:30:42.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
184412025-03-07T23:30:42.339ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
184422025-03-07T23:30:42.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database uri = /v1/utilization
184432025-03-07T23:30:42.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {} } uri = /v1/utilization
184442025-03-07T23:30:42.340ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database result = Ok(()) uri = /v1/utilization
184452025-03-07T23:30:42.344ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
184462025-03-07T23:30:42.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database uri = /v1/utilization
184472025-03-07T23:30:42.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {} } uri = /v1/utilization
184482025-03-07T23:30:42.345ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database result = Ok(()) uri = /v1/utilization
184492025-03-07T23:30:42.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
184502025-03-07T23:30:42.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
184512025-03-07T23:30:42.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
184522025-03-07T23:30:42.351ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
184532025-03-07T23:30:42.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database uri = /v1/utilization
184542025-03-07T23:30:42.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {} } uri = /v1/utilization
184552025-03-07T23:30:42.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database result = Ok(()) uri = /v1/utilization
184562025-03-07T23:30:42.356ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
184572025-03-07T23:30:42.356ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database uri = /v1/utilization
184582025-03-07T23:30:42.356ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {} } uri = /v1/utilization
184592025-03-07T23:30:42.356ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database result = Ok(()) uri = /v1/utilization
184602025-03-07T23:30:42.384ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
184612025-03-07T23:30:42.388ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
184622025-03-07T23:30:42.388ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database uri = /v1/utilization
184632025-03-07T23:30:42.388ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 roles = RoleSet { roles: {} } uri = /v1/utilization
184642025-03-07T23:30:42.389ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 resource = Database result = Ok(()) uri = /v1/utilization
184652025-03-07T23:30:42.393ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 130931 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f70f57af-c01b-4d1e-8c3b-6051db6489a2 response_code = 200 uri = /v1/utilization
184662025-03-07T23:30:42.394ZINFOtest_unauthorized (external client test context): client received response status = 200
184672025-03-07T23:30:42.394ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/utilization
184682025-03-07T23:30:42.394ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/utilization
184692025-03-07T23:30:42.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/utilization
184702025-03-07T23:30:42.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a3eb72a-abf9-473f-bbef-fe5612029e63 uri = /v1/utilization
184712025-03-07T23:30:42.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a3eb72a-abf9-473f-bbef-fe5612029e63 uri = /v1/utilization
184722025-03-07T23:30:42.394ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a3eb72a-abf9-473f-bbef-fe5612029e63 uri = /v1/utilization
184732025-03-07T23:30:42.394ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a3eb72a-abf9-473f-bbef-fe5612029e63 uri = /v1/utilization
184742025-03-07T23:30:42.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up current silo: Actor required latency_us = 298 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a3eb72a-abf9-473f-bbef-fe5612029e63 response_code = 401 uri = /v1/utilization
184752025-03-07T23:30:42.395ZINFOtest_unauthorized (external client test context): client received response status = 401
184762025-03-07T23:30:42.395ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/utilization
184772025-03-07T23:30:42.395ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/utilization
184782025-03-07T23:30:42.395ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 72b94425-e04f-422e-95df-c1c851b8e37a uri = /v1/utilization
184792025-03-07T23:30:42.395ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 72b94425-e04f-422e-95df-c1c851b8e37a uri = /v1/utilization
184802025-03-07T23:30:42.395ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 72b94425-e04f-422e-95df-c1c851b8e37a uri = /v1/utilization
184812025-03-07T23:30:42.395ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 152 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 72b94425-e04f-422e-95df-c1c851b8e37a response_code = 401 uri = /v1/utilization
184822025-03-07T23:30:42.395ZINFOtest_unauthorized (external client test context): client received response status = 401
184832025-03-07T23:30:42.395ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/utilization
184842025-03-07T23:30:42.395ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/utilization
184852025-03-07T23:30:42.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 57b07815-57f5-4782-bd9b-ef870c12ac5d uri = /v1/utilization
184862025-03-07T23:30:42.396ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 57b07815-57f5-4782-bd9b-ef870c12ac5d uri = /v1/utilization
184872025-03-07T23:30:42.398ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:235:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Utilization>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:246:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Utilization>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::utilization_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Utilization>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 57b07815-57f5-4782-bd9b-ef870c12ac5d uri = /v1/utilization
184882025-03-07T23:30:42.398ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2289 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 57b07815-57f5-4782-bd9b-ef870c12ac5d response_code = 401 uri = /v1/utilization
184892025-03-07T23:30:42.398ZINFOtest_unauthorized (external client test context): client received response status = 401
184902025-03-07T23:30:42.398ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/utilization
184912025-03-07T23:30:42.398ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/utilization
184922025-03-07T23:30:42.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d777e886-8422-4385-bfc2-32087a0f4cdc uri = /v1/utilization
184932025-03-07T23:30:42.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d777e886-8422-4385-bfc2-32087a0f4cdc response_code = 405 uri = /v1/utilization
184942025-03-07T23:30:42.399ZINFOtest_unauthorized (external client test context): client received response status = 405
184952025-03-07T23:30:42.399ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/utilization
184962025-03-07T23:30:42.399ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/utilization
184972025-03-07T23:30:42.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1c63d2ee-8256-4ae2-b5e5-85975c57c126 uri = /v1/utilization
184982025-03-07T23:30:42.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1c63d2ee-8256-4ae2-b5e5-85975c57c126 response_code = 405 uri = /v1/utilization
184992025-03-07T23:30:42.399ZINFOtest_unauthorized (external client test context): client received response status = 405
185002025-03-07T23:30:42.400ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/utilization
185012025-03-07T23:30:42.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/utilization
185022025-03-07T23:30:42.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1cd0a8b8-35c6-4fa7-be00-d8fe68e55dcf uri = /v1/utilization
185032025-03-07T23:30:42.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1cd0a8b8-35c6-4fa7-be00-d8fe68e55dcf response_code = 405 uri = /v1/utilization
185042025-03-07T23:30:42.400ZINFOtest_unauthorized (external client test context): client received response status = 405
185052025-03-07T23:30:42.400ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/utilization
185062025-03-07T23:30:42.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/utilization
185072025-03-07T23:30:42.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0a342d51-7dbc-4b5d-84c8-2f56ea886cb4 uri = /v1/utilization
185082025-03-07T23:30:42.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0a342d51-7dbc-4b5d-84c8-2f56ea886cb4 response_code = 405 uri = /v1/utilization
185092025-03-07T23:30:42.401ZINFOtest_unauthorized (external client test context): client received response status = 405
185102025-03-07T23:30:42.401ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/utilization
185112025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/utilization
185122025-03-07T23:30:42.409ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b2c92439-d21f-45b4-afcd-ada019a208b1 uri = /v1/utilization
185132025-03-07T23:30:42.409ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b2c92439-d21f-45b4-afcd-ada019a208b1 response_code = 405 uri = /v1/utilization
185142025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client received response status = 405
185152025-03-07T23:30:42.409ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/utilization
185162025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/utilization
185172025-03-07T23:30:42.409ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9052eaf9-812f-49e6-a35d-953544be4f39 uri = /v1/utilization
185182025-03-07T23:30:42.409ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9052eaf9-812f-49e6-a35d-953544be4f39 response_code = 405 uri = /v1/utilization
185192025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client received response status = 405
185202025-03-07T23:30:42.409ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/utilization
185212025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/utilization
185222025-03-07T23:30:42.409ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a66ff8f8-d71b-49c8-a309-277f1ea13625 uri = /v1/utilization
185232025-03-07T23:30:42.409ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a66ff8f8-d71b-49c8-a309-277f1ea13625 response_code = 405 uri = /v1/utilization
185242025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client received response status = 405
185252025-03-07T23:30:42.409ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/utilization
185262025-03-07T23:30:42.409ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/utilization
185272025-03-07T23:30:42.409ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 482e051c-a751-4d11-9b75-0264aa6d6703 uri = /v1/utilization
185282025-03-07T23:30:42.409ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 482e051c-a751-4d11-9b75-0264aa6d6703 response_code = 405 uri = /v1/utilization
185292025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client received response status = 405
185302025-03-07T23:30:42.410ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/utilization
185312025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/utilization
185322025-03-07T23:30:42.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 44647b43-65a5-47dc-a2a0-a294cfa15898 uri = /v1/utilization
185332025-03-07T23:30:42.410ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 44647b43-65a5-47dc-a2a0-a294cfa15898 response_code = 405 uri = /v1/utilization
185342025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client received response status = 405
185352025-03-07T23:30:42.410ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/utilization
185362025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/utilization
185372025-03-07T23:30:42.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 18f14815-5df3-4102-99a0-da4dfbf93a2b uri = /v1/utilization
185382025-03-07T23:30:42.410ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 18f14815-5df3-4102-99a0-da4dfbf93a2b response_code = 405 uri = /v1/utilization
185392025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client received response status = 405
185402025-03-07T23:30:42.410ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/utilization
185412025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/utilization
185422025-03-07T23:30:42.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f992f908-e2b8-41f9-b8b8-b13332cb3562 uri = /v1/utilization
185432025-03-07T23:30:42.410ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f992f908-e2b8-41f9-b8b8-b13332cb3562 response_code = 405 uri = /v1/utilization
185442025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client received response status = 405
185452025-03-07T23:30:42.410ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/utilization
185462025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/utilization
185472025-03-07T23:30:42.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e100190e-56d3-4fb9-83c5-57fce62ea48d uri = /v1/utilization
185482025-03-07T23:30:42.410ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e100190e-56d3-4fb9-83c5-57fce62ea48d response_code = 405 uri = /v1/utilization
185492025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client received response status = 405
185502025-03-07T23:30:42.410ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/utilization
185512025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/utilization
185522025-03-07T23:30:42.410ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 44b5bb89-1f60-4192-8c53-12d4f8f2e625 uri = /v1/utilization
185532025-03-07T23:30:42.410ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 44b5bb89-1f60-4192-8c53-12d4f8f2e625 response_code = 405 uri = /v1/utilization
185542025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client received response status = 405
185552025-03-07T23:30:42.410ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/utilization
185562025-03-07T23:30:42.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/utilization
185572025-03-07T23:30:42.411ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5d83f9f4-5bcf-45e0-a05e-af5b83107578 uri = /v1/utilization
185582025-03-07T23:30:42.411ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5d83f9f4-5bcf-45e0-a05e-af5b83107578 response_code = 405 uri = /v1/utilization
185592025-03-07T23:30:42.411ZINFOtest_unauthorized (external client test context): client received response status = 405
185602025-03-07T23:30:42.411ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/utilization
185612025-03-07T23:30:42.411ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/utilization
185622025-03-07T23:30:42.411ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f5cb6cdd-4f8f-481a-872b-1138dbdd4675 uri = /v1/utilization
185632025-03-07T23:30:42.411ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f5cb6cdd-4f8f-481a-872b-1138dbdd4675 response_code = 405 uri = /v1/utilization
185642025-03-07T23:30:42.411ZINFOtest_unauthorized (external client test context): client received response status = 405
185652025-03-07T23:30:42.411ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/utilization
185662025-03-07T23:30:42.411ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/utilization
185672025-03-07T23:30:42.411ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4c95960e-8573-4e88-931c-3a6c7a001a72 uri = /v1/utilization
185682025-03-07T23:30:42.411ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4c95960e-8573-4e88-931c-3a6c7a001a72 response_code = 405 uri = /v1/utilization
185692025-03-07T23:30:42.411ZINFOtest_unauthorized (external client test context): client received response status = 405
185702025-03-07T23:30:42.411ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/utilization
185712025-03-07T23:30:42.411ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/utilization
185722025-03-07T23:30:42.412ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec uri = /v1/utilization
185732025-03-07T23:30:42.412ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec uri = /v1/utilization
185742025-03-07T23:30:42.412ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/utilization
185752025-03-07T23:30:42.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185762025-03-07T23:30:42.412ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185772025-03-07T23:30:42.412ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185782025-03-07T23:30:42.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185792025-03-07T23:30:42.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185802025-03-07T23:30:42.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185812025-03-07T23:30:42.418ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
185822025-03-07T23:30:42.418ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
185832025-03-07T23:30:42.419ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185842025-03-07T23:30:42.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185852025-03-07T23:30:42.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185862025-03-07T23:30:42.422ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
185872025-03-07T23:30:42.422ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185882025-03-07T23:30:42.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185892025-03-07T23:30:42.423ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185902025-03-07T23:30:42.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
185912025-03-07T23:30:42.429ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
185922025-03-07T23:30:42.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185932025-03-07T23:30:42.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185942025-03-07T23:30:42.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
185952025-03-07T23:30:42.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
185962025-03-07T23:30:42.434ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
185972025-03-07T23:30:42.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
185982025-03-07T23:30:42.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
185992025-03-07T23:30:42.435ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186002025-03-07T23:30:42.439ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
186012025-03-07T23:30:42.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186022025-03-07T23:30:42.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186032025-03-07T23:30:42.440ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186042025-03-07T23:30:42.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
186052025-03-07T23:30:42.448ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
186062025-03-07T23:30:42.448ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec uri = /v1/utilization
186072025-03-07T23:30:42.448ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database uri = /v1/utilization
186082025-03-07T23:30:42.448ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {} } uri = /v1/utilization
186092025-03-07T23:30:42.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database result = Ok(()) uri = /v1/utilization
186102025-03-07T23:30:42.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
186112025-03-07T23:30:42.456ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
186122025-03-07T23:30:42.457ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database uri = /v1/utilization
186132025-03-07T23:30:42.457ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {} } uri = /v1/utilization
186142025-03-07T23:30:42.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database result = Ok(()) uri = /v1/utilization
186152025-03-07T23:30:42.468ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
186162025-03-07T23:30:42.468ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database uri = /v1/utilization
186172025-03-07T23:30:42.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {} } uri = /v1/utilization
186182025-03-07T23:30:42.469ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database result = Ok(()) uri = /v1/utilization
186192025-03-07T23:30:42.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
186202025-03-07T23:30:42.477ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
186212025-03-07T23:30:42.477ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/utilization
186222025-03-07T23:30:42.477ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/utilization
186232025-03-07T23:30:42.477ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database uri = /v1/utilization
186242025-03-07T23:30:42.478ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {} } uri = /v1/utilization
186252025-03-07T23:30:42.478ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database result = Ok(()) uri = /v1/utilization
186262025-03-07T23:30:42.482ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/utilization
186272025-03-07T23:30:42.483ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database uri = /v1/utilization
186282025-03-07T23:30:42.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {} } uri = /v1/utilization
186292025-03-07T23:30:42.484ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database result = Ok(()) uri = /v1/utilization
186302025-03-07T23:30:42.489ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/utilization
186312025-03-07T23:30:42.492ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/utilization
186322025-03-07T23:30:42.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database uri = /v1/utilization
186332025-03-07T23:30:42.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec roles = RoleSet { roles: {} } uri = /v1/utilization
186342025-03-07T23:30:42.493ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec resource = Database result = Ok(()) uri = /v1/utilization
186352025-03-07T23:30:42.500ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 88405 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 89217310-5fcd-4d39-abce-f69920e728ec response_code = 200 uri = /v1/utilization
186362025-03-07T23:30:42.501ZINFOtest_unauthorized (external client test context): client received response status = 200
186372025-03-07T23:30:42.501ZINFOtest_unauthorized: test: begin endpoint url = /v1/policy
186382025-03-07T23:30:42.501ZINFOtest_unauthorized: test: privileged GET url = /v1/policy
186392025-03-07T23:30:42.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/policy
186402025-03-07T23:30:42.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c uri = /v1/policy
186412025-03-07T23:30:42.501ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c uri = /v1/policy
186422025-03-07T23:30:42.501ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/policy
186432025-03-07T23:30:42.501ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186442025-03-07T23:30:42.501ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186452025-03-07T23:30:42.502ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186462025-03-07T23:30:42.518ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186472025-03-07T23:30:42.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186482025-03-07T23:30:42.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186492025-03-07T23:30:42.524ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
186502025-03-07T23:30:42.524ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
186512025-03-07T23:30:42.524ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186522025-03-07T23:30:42.524ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186532025-03-07T23:30:42.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186542025-03-07T23:30:42.528ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
186552025-03-07T23:30:42.528ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186562025-03-07T23:30:42.531ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186572025-03-07T23:30:42.531ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186582025-03-07T23:30:42.535ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
186592025-03-07T23:30:42.542ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
186602025-03-07T23:30:42.542ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186612025-03-07T23:30:42.542ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186622025-03-07T23:30:42.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186632025-03-07T23:30:42.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
186642025-03-07T23:30:42.546ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
186652025-03-07T23:30:42.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186662025-03-07T23:30:42.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186672025-03-07T23:30:42.547ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186682025-03-07T23:30:42.549ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
186692025-03-07T23:30:42.549ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
186702025-03-07T23:30:42.549ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
186712025-03-07T23:30:42.549ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
186722025-03-07T23:30:42.570ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
186732025-03-07T23:30:42.575ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
186742025-03-07T23:30:42.575ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c uri = /v1/policy
186752025-03-07T23:30:42.575ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database uri = /v1/policy
186762025-03-07T23:30:42.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {} } uri = /v1/policy
186772025-03-07T23:30:42.576ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database result = Ok(()) uri = /v1/policy
186782025-03-07T23:30:42.577ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
186792025-03-07T23:30:42.577ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
186802025-03-07T23:30:42.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
186812025-03-07T23:30:42.579ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
186822025-03-07T23:30:42.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database uri = /v1/policy
186832025-03-07T23:30:42.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {} } uri = /v1/policy
186842025-03-07T23:30:42.581ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database result = Ok(()) uri = /v1/policy
186852025-03-07T23:30:42.581ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
186862025-03-07T23:30:42.581ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
186872025-03-07T23:30:42.581ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
186882025-03-07T23:30:42.581ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
186892025-03-07T23:30:42.583ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
186902025-03-07T23:30:42.583ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database uri = /v1/policy
186912025-03-07T23:30:42.583ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {} } uri = /v1/policy
186922025-03-07T23:30:42.584ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database result = Ok(()) uri = /v1/policy
186932025-03-07T23:30:42.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
186942025-03-07T23:30:42.591ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
186952025-03-07T23:30:42.591ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database uri = /v1/policy
186962025-03-07T23:30:42.591ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {} } uri = /v1/policy
186972025-03-07T23:30:42.592ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database result = Ok(()) uri = /v1/policy
186982025-03-07T23:30:42.593ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
186992025-03-07T23:30:42.593ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
187002025-03-07T23:30:42.593ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database uri = /v1/policy
187012025-03-07T23:30:42.593ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {} } uri = /v1/policy
187022025-03-07T23:30:42.593ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database result = Ok(()) uri = /v1/policy
187032025-03-07T23:30:42.596ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
187042025-03-07T23:30:42.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database uri = /v1/policy
187052025-03-07T23:30:42.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {} } uri = /v1/policy
187062025-03-07T23:30:42.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Database result = Ok(()) uri = /v1/policy
187072025-03-07T23:30:42.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
187082025-03-07T23:30:42.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
187092025-03-07T23:30:42.608ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 107611 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c12180ae-018a-4b37-ae43-8fcd8a11283c response_code = 200 uri = /v1/policy
187102025-03-07T23:30:42.610ZINFOtest_unauthorized (external client test context): client received response status = 200
187112025-03-07T23:30:42.610ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/policy
187122025-03-07T23:30:42.610ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/policy
187132025-03-07T23:30:42.610ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/policy
187142025-03-07T23:30:42.610ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96559a2c-6238-439d-9d83-6a8e82f58797 uri = /v1/policy
187152025-03-07T23:30:42.610ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96559a2c-6238-439d-9d83-6a8e82f58797 uri = /v1/policy
187162025-03-07T23:30:42.610ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96559a2c-6238-439d-9d83-6a8e82f58797 uri = /v1/policy
187172025-03-07T23:30:42.610ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96559a2c-6238-439d-9d83-6a8e82f58797 uri = /v1/policy
187182025-03-07T23:30:42.610ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = loading current silo: Actor required latency_us = 211 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96559a2c-6238-439d-9d83-6a8e82f58797 response_code = 401 uri = /v1/policy
187192025-03-07T23:30:42.610ZINFOtest_unauthorized (external client test context): client received response status = 401
187202025-03-07T23:30:42.610ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/policy
187212025-03-07T23:30:42.610ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/policy
187222025-03-07T23:30:42.611ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 414add5a-5028-466c-ad8d-bf4074133741 uri = /v1/policy
187232025-03-07T23:30:42.611ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 414add5a-5028-466c-ad8d-bf4074133741 uri = /v1/policy
187242025-03-07T23:30:42.611ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 414add5a-5028-466c-ad8d-bf4074133741 uri = /v1/policy
187252025-03-07T23:30:42.611ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 173 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 414add5a-5028-466c-ad8d-bf4074133741 response_code = 401 uri = /v1/policy
187262025-03-07T23:30:42.611ZINFOtest_unauthorized (external client test context): client received response status = 401
187272025-03-07T23:30:42.611ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/policy
187282025-03-07T23:30:42.611ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/policy
187292025-03-07T23:30:42.611ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 62e87930-858a-46a8-ace2-f87b8b5ea062 uri = /v1/policy
187302025-03-07T23:30:42.611ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 62e87930-858a-46a8-ace2-f87b8b5ea062 uri = /v1/policy
187312025-03-07T23:30:42.613ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:176:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:192:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_view::{async_fn_env#0}, (), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 62e87930-858a-46a8-ace2-f87b8b5ea062 uri = /v1/policy
187322025-03-07T23:30:42.613ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 973 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 62e87930-858a-46a8-ace2-f87b8b5ea062 response_code = 401 uri = /v1/policy
187332025-03-07T23:30:42.613ZINFOtest_unauthorized (external client test context): client received response status = 401
187342025-03-07T23:30:42.613ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/policy
187352025-03-07T23:30:42.613ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/policy
187362025-03-07T23:30:42.613ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca uri = /v1/policy
187372025-03-07T23:30:42.613ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca uri = /v1/policy
187382025-03-07T23:30:42.613ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/policy
187392025-03-07T23:30:42.613ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187402025-03-07T23:30:42.613ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187412025-03-07T23:30:42.614ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187422025-03-07T23:30:42.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187432025-03-07T23:30:42.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187442025-03-07T23:30:42.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187452025-03-07T23:30:42.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
187462025-03-07T23:30:42.620ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
187472025-03-07T23:30:42.620ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187482025-03-07T23:30:42.620ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187492025-03-07T23:30:42.621ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187502025-03-07T23:30:42.623ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
187512025-03-07T23:30:42.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187522025-03-07T23:30:42.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187532025-03-07T23:30:42.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187542025-03-07T23:30:42.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
187552025-03-07T23:30:42.634ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
187562025-03-07T23:30:42.634ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187572025-03-07T23:30:42.634ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187582025-03-07T23:30:42.635ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187592025-03-07T23:30:42.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
187602025-03-07T23:30:42.637ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
187612025-03-07T23:30:42.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187622025-03-07T23:30:42.637ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187632025-03-07T23:30:42.638ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187642025-03-07T23:30:42.642ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
187652025-03-07T23:30:42.643ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
187662025-03-07T23:30:42.643ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
187672025-03-07T23:30:42.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
187682025-03-07T23:30:42.647ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
187692025-03-07T23:30:42.652ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
187702025-03-07T23:30:42.652ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca uri = /v1/policy
187712025-03-07T23:30:42.652ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Database uri = /v1/policy
187722025-03-07T23:30:42.652ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca roles = RoleSet { roles: {} } uri = /v1/policy
187732025-03-07T23:30:42.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Database result = Ok(()) uri = /v1/policy
187742025-03-07T23:30:42.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
187752025-03-07T23:30:42.659ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
187762025-03-07T23:30:42.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Database uri = /v1/policy
187772025-03-07T23:30:42.659ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca roles = RoleSet { roles: {} } uri = /v1/policy
187782025-03-07T23:30:42.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Database result = Ok(()) uri = /v1/policy
187792025-03-07T23:30:42.664ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
187802025-03-07T23:30:42.665ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Database uri = /v1/policy
187812025-03-07T23:30:42.665ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca roles = RoleSet { roles: {} } uri = /v1/policy
187822025-03-07T23:30:42.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Database result = Ok(()) uri = /v1/policy
187832025-03-07T23:30:42.669ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca roles = RoleSet { roles: {} } uri = /v1/policy
187842025-03-07T23:30:42.692ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Err(Forbidden) uri = /v1/policy
187852025-03-07T23:30:42.692ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 79746 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 534fb886-80af-4205-8a1e-0c69aacb08ca response_code = 403 uri = /v1/policy
187862025-03-07T23:30:42.694ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
187872025-03-07T23:30:42.698ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
187882025-03-07T23:30:42.698ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
187892025-03-07T23:30:42.698ZINFOtest_unauthorized (external client test context): client received response status = 403
187902025-03-07T23:30:42.698ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/policy
187912025-03-07T23:30:42.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/policy
187922025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53ff58ca-bb23-4ccb-bf77-55a475982725 uri = /v1/policy
187932025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53ff58ca-bb23-4ccb-bf77-55a475982725 uri = /v1/policy
187942025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53ff58ca-bb23-4ccb-bf77-55a475982725 uri = /v1/policy
187952025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53ff58ca-bb23-4ccb-bf77-55a475982725 uri = /v1/policy
187962025-03-07T23:30:42.698ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = loading current silo: Actor required latency_us = 673 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53ff58ca-bb23-4ccb-bf77-55a475982725 response_code = 401 uri = /v1/policy
187972025-03-07T23:30:42.698ZINFOtest_unauthorized (external client test context): client received response status = 401
187982025-03-07T23:30:42.698ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/policy
187992025-03-07T23:30:42.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/policy
188002025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 24ecab6c-3c8a-48f8-a879-b0adba16379c uri = /v1/policy
188012025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 24ecab6c-3c8a-48f8-a879-b0adba16379c uri = /v1/policy
188022025-03-07T23:30:42.698ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 24ecab6c-3c8a-48f8-a879-b0adba16379c uri = /v1/policy
188032025-03-07T23:30:42.699ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 177 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 24ecab6c-3c8a-48f8-a879-b0adba16379c response_code = 401 uri = /v1/policy
188042025-03-07T23:30:42.699ZINFOtest_unauthorized (external client test context): client received response status = 401
188052025-03-07T23:30:42.699ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/policy
188062025-03-07T23:30:42.699ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/policy
188072025-03-07T23:30:42.699ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 210c706d-78e9-4e8d-b5f8-4a9f0eeea968 uri = /v1/policy
188082025-03-07T23:30:42.699ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 210c706d-78e9-4e8d-b5f8-4a9f0eeea968 uri = /v1/policy
188092025-03-07T23:30:42.700ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:208:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:225:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::policy_update::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::SiloRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 210c706d-78e9-4e8d-b5f8-4a9f0eeea968 uri = /v1/policy
188102025-03-07T23:30:42.700ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1681 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 210c706d-78e9-4e8d-b5f8-4a9f0eeea968 response_code = 401 uri = /v1/policy
188112025-03-07T23:30:42.700ZINFOtest_unauthorized (external client test context): client received response status = 401
188122025-03-07T23:30:42.700ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/policy
188132025-03-07T23:30:42.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/policy
188142025-03-07T23:30:42.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 716f702c-a0f4-44c9-a3c4-d29a36b2ae96 uri = /v1/policy
188152025-03-07T23:30:42.700ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 716f702c-a0f4-44c9-a3c4-d29a36b2ae96 response_code = 405 uri = /v1/policy
188162025-03-07T23:30:42.700ZINFOtest_unauthorized (external client test context): client received response status = 405
188172025-03-07T23:30:42.700ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/policy
188182025-03-07T23:30:42.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/policy
188192025-03-07T23:30:42.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b7ee8193-7a5f-427e-b7f2-aa379de52ab0 uri = /v1/policy
188202025-03-07T23:30:42.700ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b7ee8193-7a5f-427e-b7f2-aa379de52ab0 response_code = 405 uri = /v1/policy
188212025-03-07T23:30:42.700ZINFOtest_unauthorized (external client test context): client received response status = 405
188222025-03-07T23:30:42.700ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/policy
188232025-03-07T23:30:42.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/policy
188242025-03-07T23:30:42.701ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 18f3d11d-88e4-47df-99ff-b50e71d0b752 uri = /v1/policy
188252025-03-07T23:30:42.702ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 18f3d11d-88e4-47df-99ff-b50e71d0b752 response_code = 405 uri = /v1/policy
188262025-03-07T23:30:42.702ZINFOtest_unauthorized (external client test context): client received response status = 405
188272025-03-07T23:30:42.702ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/policy
188282025-03-07T23:30:42.702ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/policy
188292025-03-07T23:30:42.702ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 00648f2e-ad8b-438f-8ef9-840334a9510b uri = /v1/policy
188302025-03-07T23:30:42.702ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 00648f2e-ad8b-438f-8ef9-840334a9510b response_code = 405 uri = /v1/policy
188312025-03-07T23:30:42.702ZINFOtest_unauthorized (external client test context): client received response status = 405
188322025-03-07T23:30:42.702ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/policy
188332025-03-07T23:30:42.702ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/policy
188342025-03-07T23:30:42.703ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4cf3ed7-a74c-4225-a362-85be9f1b9149 uri = /v1/policy
188352025-03-07T23:30:42.703ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4cf3ed7-a74c-4225-a362-85be9f1b9149 response_code = 405 uri = /v1/policy
188362025-03-07T23:30:42.711ZINFOtest_unauthorized (external client test context): client received response status = 405
188372025-03-07T23:30:42.711ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/policy
188382025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/policy
188392025-03-07T23:30:42.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 66a767e9-6225-489e-b61e-1f5007a427dc uri = /v1/policy
188402025-03-07T23:30:42.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 223 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 66a767e9-6225-489e-b61e-1f5007a427dc response_code = 405 uri = /v1/policy
188412025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client received response status = 405
188422025-03-07T23:30:42.712ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/policy
188432025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/policy
188442025-03-07T23:30:42.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d5337a53-9a10-46bc-9903-4693930b1535 uri = /v1/policy
188452025-03-07T23:30:42.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d5337a53-9a10-46bc-9903-4693930b1535 response_code = 405 uri = /v1/policy
188462025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client received response status = 405
188472025-03-07T23:30:42.712ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/policy
188482025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/policy
188492025-03-07T23:30:42.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9de851fa-df77-4502-87b3-42b0bd5bc75a uri = /v1/policy
188502025-03-07T23:30:42.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9de851fa-df77-4502-87b3-42b0bd5bc75a response_code = 405 uri = /v1/policy
188512025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client received response status = 405
188522025-03-07T23:30:42.712ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/policy
188532025-03-07T23:30:42.712ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/policy
188542025-03-07T23:30:42.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 87e7b477-3669-435a-b29d-07316ede7bfe uri = /v1/policy
188552025-03-07T23:30:42.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 87e7b477-3669-435a-b29d-07316ede7bfe response_code = 405 uri = /v1/policy
188562025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client received response status = 405
188572025-03-07T23:30:42.713ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/policy
188582025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/policy
188592025-03-07T23:30:42.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3da50f39-72ae-46af-8275-6f02d033e529 uri = /v1/policy
188602025-03-07T23:30:42.713ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3da50f39-72ae-46af-8275-6f02d033e529 response_code = 405 uri = /v1/policy
188612025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client received response status = 405
188622025-03-07T23:30:42.713ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/policy
188632025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/policy
188642025-03-07T23:30:42.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 466a9d45-bb0b-4c74-bc95-4abdedb1fef4 uri = /v1/policy
188652025-03-07T23:30:42.713ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 35 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 466a9d45-bb0b-4c74-bc95-4abdedb1fef4 response_code = 405 uri = /v1/policy
188662025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client received response status = 405
188672025-03-07T23:30:42.713ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/policy
188682025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/policy
188692025-03-07T23:30:42.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a2754cdb-a4d3-4163-9ffc-882cc0e2c4be uri = /v1/policy
188702025-03-07T23:30:42.713ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 34 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a2754cdb-a4d3-4163-9ffc-882cc0e2c4be response_code = 405 uri = /v1/policy
188712025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client received response status = 405
188722025-03-07T23:30:42.713ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/policy
188732025-03-07T23:30:42.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/policy
188742025-03-07T23:30:42.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f uri = /v1/policy
188752025-03-07T23:30:42.713ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f uri = /v1/policy
188762025-03-07T23:30:42.713ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/policy
188772025-03-07T23:30:42.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188782025-03-07T23:30:42.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188792025-03-07T23:30:42.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188802025-03-07T23:30:42.714ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188812025-03-07T23:30:42.714ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188822025-03-07T23:30:42.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188832025-03-07T23:30:42.718ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
188842025-03-07T23:30:42.718ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
188852025-03-07T23:30:42.719ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188862025-03-07T23:30:42.719ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188872025-03-07T23:30:42.721ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188882025-03-07T23:30:42.727ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
188892025-03-07T23:30:42.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188902025-03-07T23:30:42.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188912025-03-07T23:30:42.730ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188922025-03-07T23:30:42.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
188932025-03-07T23:30:42.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
188942025-03-07T23:30:42.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
188952025-03-07T23:30:42.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
188962025-03-07T23:30:42.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
188972025-03-07T23:30:42.760ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
188982025-03-07T23:30:42.760ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
188992025-03-07T23:30:42.761ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189002025-03-07T23:30:42.761ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189012025-03-07T23:30:42.761ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189022025-03-07T23:30:42.766ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
189032025-03-07T23:30:42.766ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189042025-03-07T23:30:42.766ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189052025-03-07T23:30:42.766ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189062025-03-07T23:30:42.770ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
189072025-03-07T23:30:42.776ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
189082025-03-07T23:30:42.776ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f uri = /v1/policy
189092025-03-07T23:30:42.777ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database uri = /v1/policy
189102025-03-07T23:30:42.777ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {} } uri = /v1/policy
189112025-03-07T23:30:42.777ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database result = Ok(()) uri = /v1/policy
189122025-03-07T23:30:42.788ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
189132025-03-07T23:30:42.788ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
189142025-03-07T23:30:42.788ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database uri = /v1/policy
189152025-03-07T23:30:42.788ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {} } uri = /v1/policy
189162025-03-07T23:30:42.789ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database result = Ok(()) uri = /v1/policy
189172025-03-07T23:30:42.814ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
189182025-03-07T23:30:42.814ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database uri = /v1/policy
189192025-03-07T23:30:42.814ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {} } uri = /v1/policy
189202025-03-07T23:30:42.814ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database result = Ok(()) uri = /v1/policy
189212025-03-07T23:30:42.818ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
189222025-03-07T23:30:42.823ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
189232025-03-07T23:30:42.823ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database uri = /v1/policy
189242025-03-07T23:30:42.823ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {} } uri = /v1/policy
189252025-03-07T23:30:42.824ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database result = Ok(()) uri = /v1/policy
189262025-03-07T23:30:42.824ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/policy
189272025-03-07T23:30:42.824ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/policy
189282025-03-07T23:30:42.824ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database uri = /v1/policy
189292025-03-07T23:30:42.824ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {} } uri = /v1/policy
189302025-03-07T23:30:42.824ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database result = Ok(()) uri = /v1/policy
189312025-03-07T23:30:42.867ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/policy
189322025-03-07T23:30:42.867ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database uri = /v1/policy
189332025-03-07T23:30:42.867ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {} } uri = /v1/policy
189342025-03-07T23:30:42.887ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Database result = Ok(()) uri = /v1/policy
189352025-03-07T23:30:42.895ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/policy
189362025-03-07T23:30:42.899ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/policy
189372025-03-07T23:30:42.900ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 191466 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cb1ae6b3-2427-491a-bdab-fc81e4d1d11f response_code = 200 uri = /v1/policy
189382025-03-07T23:30:42.902ZINFOtest_unauthorized (external client test context): client received response status = 200
189392025-03-07T23:30:42.903ZINFOtest_unauthorized: test: begin endpoint url = /v1/users
189402025-03-07T23:30:42.903ZINFOtest_unauthorized: test: privileged GET url = /v1/users
189412025-03-07T23:30:42.903ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/users
189422025-03-07T23:30:42.903ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 uri = /v1/users
189432025-03-07T23:30:42.903ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 uri = /v1/users
189442025-03-07T23:30:42.903ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/users
189452025-03-07T23:30:42.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189462025-03-07T23:30:42.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189472025-03-07T23:30:42.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189482025-03-07T23:30:42.906ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189492025-03-07T23:30:42.906ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189502025-03-07T23:30:42.907ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189512025-03-07T23:30:42.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
189522025-03-07T23:30:42.915ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
189532025-03-07T23:30:42.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189542025-03-07T23:30:42.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189552025-03-07T23:30:42.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189562025-03-07T23:30:42.919ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
189572025-03-07T23:30:42.919ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189582025-03-07T23:30:42.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189592025-03-07T23:30:42.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189602025-03-07T23:30:42.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
189612025-03-07T23:30:42.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
189622025-03-07T23:30:42.927ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189632025-03-07T23:30:42.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189642025-03-07T23:30:42.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189652025-03-07T23:30:42.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
189662025-03-07T23:30:42.935ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
189672025-03-07T23:30:42.935ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189682025-03-07T23:30:42.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189692025-03-07T23:30:42.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189702025-03-07T23:30:42.943ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
189712025-03-07T23:30:42.943ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
189722025-03-07T23:30:42.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
189732025-03-07T23:30:42.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
189742025-03-07T23:30:42.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
189752025-03-07T23:30:42.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
189762025-03-07T23:30:42.950ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 uri = /v1/users
189772025-03-07T23:30:42.950ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) uri = /v1/users
189782025-03-07T23:30:42.950ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/users
189792025-03-07T23:30:42.950ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = Database uri = /v1/users
189802025-03-07T23:30:42.950ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 roles = RoleSet { roles: {} } uri = /v1/users
189812025-03-07T23:30:42.950ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = Database result = Ok(()) uri = /v1/users
189822025-03-07T23:30:42.955ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/users
189832025-03-07T23:30:42.955ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = Database uri = /v1/users
189842025-03-07T23:30:42.955ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 roles = RoleSet { roles: {} } uri = /v1/users
189852025-03-07T23:30:42.956ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = Database result = Ok(()) uri = /v1/users
189862025-03-07T23:30:42.979ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/users
189872025-03-07T23:30:42.986ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) result = Ok(()) uri = /v1/users
189882025-03-07T23:30:42.986ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = Database uri = /v1/users
189892025-03-07T23:30:42.987ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 roles = RoleSet { roles: {} } uri = /v1/users
189902025-03-07T23:30:42.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 resource = Database result = Ok(()) uri = /v1/users
189912025-03-07T23:30:42.996ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 95069 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 54cea1fc-e999-4bea-b44c-ffe4763d9868 response_code = 200 uri = /v1/users
189922025-03-07T23:30:43.001ZINFOtest_unauthorized (external client test context): client received response status = 200
189932025-03-07T23:30:43.001ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/users
189942025-03-07T23:30:43.001ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/users
189952025-03-07T23:30:43.001ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/users
189962025-03-07T23:30:43.001ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 98485d16-22d8-444c-b176-114cbf27cb8e uri = /v1/users
189972025-03-07T23:30:43.001ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 98485d16-22d8-444c-b176-114cbf27cb8e uri = /v1/users
189982025-03-07T23:30:43.001ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 98485d16-22d8-444c-b176-114cbf27cb8e uri = /v1/users
189992025-03-07T23:30:43.001ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 98485d16-22d8-444c-b176-114cbf27cb8e uri = /v1/users
190002025-03-07T23:30:43.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing current silo's users: Actor required latency_us = 244 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 98485d16-22d8-444c-b176-114cbf27cb8e response_code = 401 uri = /v1/users
190012025-03-07T23:30:43.007ZINFOtest_unauthorized (external client test context): client received response status = 401
190022025-03-07T23:30:43.007ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/users
190032025-03-07T23:30:43.007ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/users
190042025-03-07T23:30:43.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f416df7f-e5a7-4bd7-b5c2-8f2b2943e249 uri = /v1/users
190052025-03-07T23:30:43.007ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f416df7f-e5a7-4bd7-b5c2-8f2b2943e249 uri = /v1/users
190062025-03-07T23:30:43.007ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f416df7f-e5a7-4bd7-b5c2-8f2b2943e249 uri = /v1/users
190072025-03-07T23:30:43.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 148 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f416df7f-e5a7-4bd7-b5c2-8f2b2943e249 response_code = 401 uri = /v1/users
190082025-03-07T23:30:43.007ZINFOtest_unauthorized (external client test context): client received response status = 401
190092025-03-07T23:30:43.007ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/users
190102025-03-07T23:30:43.007ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/users
190112025-03-07T23:30:43.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e13fa0b1-c62f-4349-b7eb-1fa2060392fe uri = /v1/users
190122025-03-07T23:30:43.007ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e13fa0b1-c62f-4349-b7eb-1fa2060392fe uri = /v1/users
190132025-03-07T23:30:43.008ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:6627:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:6654:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::user_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::OptionalGroupSelector>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e13fa0b1-c62f-4349-b7eb-1fa2060392fe uri = /v1/users
190142025-03-07T23:30:43.008ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1133 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e13fa0b1-c62f-4349-b7eb-1fa2060392fe response_code = 401 uri = /v1/users
190152025-03-07T23:30:43.008ZINFOtest_unauthorized (external client test context): client received response status = 401
190162025-03-07T23:30:43.008ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/users
190172025-03-07T23:30:43.008ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/users
190182025-03-07T23:30:43.008ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30218f2f-d1f4-4bcf-8b7d-0556d4451d17 uri = /v1/users
190192025-03-07T23:30:43.008ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30218f2f-d1f4-4bcf-8b7d-0556d4451d17 response_code = 405 uri = /v1/users
190202025-03-07T23:30:43.018ZINFOtest_unauthorized (external client test context): client received response status = 405
190212025-03-07T23:30:43.018ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/users
190222025-03-07T23:30:43.018ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/users
190232025-03-07T23:30:43.018ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4ebbf34d-8ed0-423f-8584-0948d9ac7b6e uri = /v1/users
190242025-03-07T23:30:43.019ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 114 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4ebbf34d-8ed0-423f-8584-0948d9ac7b6e response_code = 405 uri = /v1/users
190252025-03-07T23:30:43.019ZINFOtest_unauthorized (external client test context): client received response status = 405
190262025-03-07T23:30:43.019ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/users
190272025-03-07T23:30:43.019ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/users
190282025-03-07T23:30:43.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1c5a6582-a25d-4cdd-90f4-6f2a22104e74 uri = /v1/users
190292025-03-07T23:30:43.020ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1c5a6582-a25d-4cdd-90f4-6f2a22104e74 response_code = 405 uri = /v1/users
190302025-03-07T23:30:43.021ZINFOtest_unauthorized (external client test context): client received response status = 405
190312025-03-07T23:30:43.021ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/users
190322025-03-07T23:30:43.021ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/users
190332025-03-07T23:30:43.021ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c02db32b-9c93-40c7-a4b9-3d2b2ab3e09f uri = /v1/users
190342025-03-07T23:30:43.021ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c02db32b-9c93-40c7-a4b9-3d2b2ab3e09f response_code = 405 uri = /v1/users
190352025-03-07T23:30:43.021ZINFOtest_unauthorized (external client test context): client received response status = 405
190362025-03-07T23:30:43.021ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/users
190372025-03-07T23:30:43.021ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/users
190382025-03-07T23:30:43.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06274a58-e6cc-4a61-ad89-aa84306a1abf uri = /v1/users
190392025-03-07T23:30:43.022ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06274a58-e6cc-4a61-ad89-aa84306a1abf response_code = 405 uri = /v1/users
190402025-03-07T23:30:43.022ZINFOtest_unauthorized (external client test context): client received response status = 405
190412025-03-07T23:30:43.022ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/users
190422025-03-07T23:30:43.022ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/users
190432025-03-07T23:30:43.022ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 839948f8-7aab-4ee2-ad65-ff655963d767 uri = /v1/users
190442025-03-07T23:30:43.022ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 839948f8-7aab-4ee2-ad65-ff655963d767 response_code = 405 uri = /v1/users
190452025-03-07T23:30:43.022ZINFOtest_unauthorized (external client test context): client received response status = 405
190462025-03-07T23:30:43.022ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/users
190472025-03-07T23:30:43.022ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/users
190482025-03-07T23:30:43.023ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 03145518-4707-4845-ab4b-da50733aeb74 uri = /v1/users
190492025-03-07T23:30:43.023ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 03145518-4707-4845-ab4b-da50733aeb74 response_code = 405 uri = /v1/users
190502025-03-07T23:30:43.023ZINFOtest_unauthorized (external client test context): client received response status = 405
190512025-03-07T23:30:43.023ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/users
190522025-03-07T23:30:43.023ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/users
190532025-03-07T23:30:43.023ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e6ced4bc-8243-4e10-97e4-b9319511f9cb uri = /v1/users
190542025-03-07T23:30:43.023ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 105 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e6ced4bc-8243-4e10-97e4-b9319511f9cb response_code = 405 uri = /v1/users
190552025-03-07T23:30:43.023ZINFOtest_unauthorized (external client test context): client received response status = 405
190562025-03-07T23:30:43.023ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/users
190572025-03-07T23:30:43.023ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/users
190582025-03-07T23:30:43.046ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4e45b7f5-5d30-4a66-9971-e91d3ec24f6a uri = /v1/users
190592025-03-07T23:30:43.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4e45b7f5-5d30-4a66-9971-e91d3ec24f6a response_code = 405 uri = /v1/users
190602025-03-07T23:30:43.047ZINFOtest_unauthorized (external client test context): client received response status = 405
190612025-03-07T23:30:43.047ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/users
190622025-03-07T23:30:43.047ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/users
190632025-03-07T23:30:43.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36f4e3bc-3bc1-455e-a13b-06a74882aff2 uri = /v1/users
190642025-03-07T23:30:43.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36f4e3bc-3bc1-455e-a13b-06a74882aff2 response_code = 405 uri = /v1/users
190652025-03-07T23:30:43.048ZINFOtest_unauthorized (external client test context): client received response status = 405
190662025-03-07T23:30:43.048ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/users
190672025-03-07T23:30:43.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/users
190682025-03-07T23:30:43.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9bca4073-a93c-415b-a898-27de5113640f uri = /v1/users
190692025-03-07T23:30:43.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9bca4073-a93c-415b-a898-27de5113640f response_code = 405 uri = /v1/users
190702025-03-07T23:30:43.048ZINFOtest_unauthorized (external client test context): client received response status = 405
190712025-03-07T23:30:43.048ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/users
190722025-03-07T23:30:43.049ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/users
190732025-03-07T23:30:43.049ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 31ce47fa-5709-4388-854d-0f15ad0009cb uri = /v1/users
190742025-03-07T23:30:43.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 31ce47fa-5709-4388-854d-0f15ad0009cb response_code = 405 uri = /v1/users
190752025-03-07T23:30:43.049ZINFOtest_unauthorized (external client test context): client received response status = 405
190762025-03-07T23:30:43.049ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/users
190772025-03-07T23:30:43.049ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/users
190782025-03-07T23:30:43.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8592f356-2ac0-4faa-90b2-b4f538e16477 uri = /v1/users
190792025-03-07T23:30:43.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8592f356-2ac0-4faa-90b2-b4f538e16477 response_code = 405 uri = /v1/users
190802025-03-07T23:30:43.050ZINFOtest_unauthorized (external client test context): client received response status = 405
190812025-03-07T23:30:43.050ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/users
190822025-03-07T23:30:43.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/users
190832025-03-07T23:30:43.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2b9bc7ff-0424-4888-85ea-3c71e583539e uri = /v1/users
190842025-03-07T23:30:43.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2b9bc7ff-0424-4888-85ea-3c71e583539e response_code = 405 uri = /v1/users
190852025-03-07T23:30:43.051ZINFOtest_unauthorized (external client test context): client received response status = 405
190862025-03-07T23:30:43.051ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/users
190872025-03-07T23:30:43.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/users
190882025-03-07T23:30:43.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ffdd2726-747a-4418-b52d-119dcc74b05f uri = /v1/users
190892025-03-07T23:30:43.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 103 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ffdd2726-747a-4418-b52d-119dcc74b05f response_code = 405 uri = /v1/users
190902025-03-07T23:30:43.051ZINFOtest_unauthorized (external client test context): client received response status = 405
190912025-03-07T23:30:43.051ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/users
190922025-03-07T23:30:43.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/users
190932025-03-07T23:30:43.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 664540b8-2f22-491f-8548-b4e2f16b26c2 uri = /v1/users
190942025-03-07T23:30:43.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 664540b8-2f22-491f-8548-b4e2f16b26c2 response_code = 405 uri = /v1/users
190952025-03-07T23:30:43.052ZINFOtest_unauthorized (external client test context): client received response status = 405
190962025-03-07T23:30:43.052ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/users
190972025-03-07T23:30:43.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/users
190982025-03-07T23:30:43.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 uri = /v1/users
190992025-03-07T23:30:43.052ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 uri = /v1/users
191002025-03-07T23:30:43.052ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/users
191012025-03-07T23:30:43.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191022025-03-07T23:30:43.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191032025-03-07T23:30:43.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191042025-03-07T23:30:43.055ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191052025-03-07T23:30:43.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191062025-03-07T23:30:43.057ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191072025-03-07T23:30:43.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
191082025-03-07T23:30:43.059ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
191092025-03-07T23:30:43.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191102025-03-07T23:30:43.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191112025-03-07T23:30:43.060ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191122025-03-07T23:30:43.062ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
191132025-03-07T23:30:43.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191142025-03-07T23:30:43.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191152025-03-07T23:30:43.113ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191162025-03-07T23:30:43.159ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
191172025-03-07T23:30:43.160ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
191182025-03-07T23:30:43.160ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
191192025-03-07T23:30:43.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
191202025-03-07T23:30:43.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
191212025-03-07T23:30:43.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
191222025-03-07T23:30:43.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191232025-03-07T23:30:43.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191242025-03-07T23:30:43.166ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191252025-03-07T23:30:43.174ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
191262025-03-07T23:30:43.174ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
191272025-03-07T23:30:43.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
191282025-03-07T23:30:43.176ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
191292025-03-07T23:30:43.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191302025-03-07T23:30:43.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191312025-03-07T23:30:43.177ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191322025-03-07T23:30:43.179ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
191332025-03-07T23:30:43.179ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
191342025-03-07T23:30:43.181ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
191352025-03-07T23:30:43.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191362025-03-07T23:30:43.181ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191372025-03-07T23:30:43.184ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191382025-03-07T23:30:43.189ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
191392025-03-07T23:30:43.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
191402025-03-07T23:30:43.195ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 uri = /v1/users
191412025-03-07T23:30:43.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) uri = /v1/users
191422025-03-07T23:30:43.195ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/users
191432025-03-07T23:30:43.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = Database uri = /v1/users
191442025-03-07T23:30:43.195ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 roles = RoleSet { roles: {} } uri = /v1/users
191452025-03-07T23:30:43.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = Database result = Ok(()) uri = /v1/users
191462025-03-07T23:30:43.199ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/users
191472025-03-07T23:30:43.199ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = Database uri = /v1/users
191482025-03-07T23:30:43.199ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 roles = RoleSet { roles: {} } uri = /v1/users
191492025-03-07T23:30:43.213ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = Database result = Ok(()) uri = /v1/users
191502025-03-07T23:30:43.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/users
191512025-03-07T23:30:43.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }) result = Ok(()) uri = /v1/users
191522025-03-07T23:30:43.229ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = Database uri = /v1/users
191532025-03-07T23:30:43.229ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 roles = RoleSet { roles: {} } uri = /v1/users
191542025-03-07T23:30:43.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 resource = Database result = Ok(()) uri = /v1/users
191552025-03-07T23:30:43.265ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
191562025-03-07T23:30:43.266ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 213554 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 93859f95-81fa-4e2c-b895-fff9f6c2acc5 response_code = 200 uri = /v1/users
191572025-03-07T23:30:43.267ZINFOtest_unauthorized (external client test context): client received response status = 200
191582025-03-07T23:30:43.267ZINFOtest_unauthorized: test: begin endpoint url = /v1/groups
191592025-03-07T23:30:43.267ZINFOtest_unauthorized: test: privileged GET url = /v1/groups
191602025-03-07T23:30:43.267ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups
191612025-03-07T23:30:43.267ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 uri = /v1/groups
191622025-03-07T23:30:43.267ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 uri = /v1/groups
191632025-03-07T23:30:43.267ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/groups
191642025-03-07T23:30:43.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191652025-03-07T23:30:43.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191662025-03-07T23:30:43.268ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191672025-03-07T23:30:43.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191682025-03-07T23:30:43.277ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191692025-03-07T23:30:43.278ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191702025-03-07T23:30:43.280ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
191712025-03-07T23:30:43.280ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
191722025-03-07T23:30:43.280ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191732025-03-07T23:30:43.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191742025-03-07T23:30:43.281ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191752025-03-07T23:30:43.283ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
191762025-03-07T23:30:43.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191772025-03-07T23:30:43.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191782025-03-07T23:30:43.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191792025-03-07T23:30:43.286ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
191802025-03-07T23:30:43.289ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
191812025-03-07T23:30:43.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191822025-03-07T23:30:43.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191832025-03-07T23:30:43.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191842025-03-07T23:30:43.291ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
191852025-03-07T23:30:43.291ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
191862025-03-07T23:30:43.291ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191872025-03-07T23:30:43.291ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191882025-03-07T23:30:43.292ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191892025-03-07T23:30:43.296ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
191902025-03-07T23:30:43.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
191912025-03-07T23:30:43.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
191922025-03-07T23:30:43.297ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
191932025-03-07T23:30:43.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
191942025-03-07T23:30:43.329ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
191952025-03-07T23:30:43.353ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 uri = /v1/groups
191962025-03-07T23:30:43.354ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/groups
191972025-03-07T23:30:43.356ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/groups
191982025-03-07T23:30:43.357ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Database uri = /v1/groups
191992025-03-07T23:30:43.357ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 roles = RoleSet { roles: {} } uri = /v1/groups
192002025-03-07T23:30:43.360ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Database result = Ok(()) uri = /v1/groups
192012025-03-07T23:30:43.375ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/groups
192022025-03-07T23:30:43.375ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Database uri = /v1/groups
192032025-03-07T23:30:43.375ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 roles = RoleSet { roles: {} } uri = /v1/groups
192042025-03-07T23:30:43.376ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Database result = Ok(()) uri = /v1/groups
192052025-03-07T23:30:43.457ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
192062025-03-07T23:30:43.458ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
192072025-03-07T23:30:43.458ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/groups
192082025-03-07T23:30:43.462ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/groups
192092025-03-07T23:30:43.463ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Database uri = /v1/groups
192102025-03-07T23:30:43.463ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 roles = RoleSet { roles: {} } uri = /v1/groups
192112025-03-07T23:30:43.464ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 resource = Database result = Ok(()) uri = /v1/groups
192122025-03-07T23:30:43.471ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e283777-3c3c-466e-879e-cfd973319980 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
192132025-03-07T23:30:43.471ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e283777-3c3c-466e-879e-cfd973319980 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
192142025-03-07T23:30:43.471ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e283777-3c3c-466e-879e-cfd973319980 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
192152025-03-07T23:30:43.473ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e283777-3c3c-466e-879e-cfd973319980 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
192162025-03-07T23:30:43.485ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 218137 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8e1ad172-d92d-4f91-baa8-89478bf3b264 response_code = 200 uri = /v1/groups
192172025-03-07T23:30:43.485ZINFOtest_unauthorized (external client test context): client received response status = 200
192182025-03-07T23:30:43.485ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/groups
192192025-03-07T23:30:43.486ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/groups
192202025-03-07T23:30:43.486ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups
192212025-03-07T23:30:43.487ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0deb092-3e6d-4015-ad0f-adc99279a5fa uri = /v1/groups
192222025-03-07T23:30:43.487ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0deb092-3e6d-4015-ad0f-adc99279a5fa uri = /v1/groups
192232025-03-07T23:30:43.487ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0deb092-3e6d-4015-ad0f-adc99279a5fa uri = /v1/groups
192242025-03-07T23:30:43.487ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0deb092-3e6d-4015-ad0f-adc99279a5fa uri = /v1/groups
192252025-03-07T23:30:43.487ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing current silo's groups: Actor required latency_us = 617 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0deb092-3e6d-4015-ad0f-adc99279a5fa response_code = 401 uri = /v1/groups
192262025-03-07T23:30:43.488ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 19487 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e283777-3c3c-466e-879e-cfd973319980 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
192272025-03-07T23:30:43.498ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "7e283777-3c3c-466e-879e-cfd973319980", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:43 GMT"} })
192282025-03-07T23:30:43.525ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
192292025-03-07T23:30:43.525ZINFOtest_unauthorized (external client test context): client received response status = 401
192302025-03-07T23:30:43.525ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/groups
192312025-03-07T23:30:43.525ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups
192322025-03-07T23:30:43.526ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 96093279-aebe-45ae-944b-9d99c97262ee uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
192332025-03-07T23:30:43.526ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 96093279-aebe-45ae-944b-9d99c97262ee resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
192342025-03-07T23:30:43.526ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 96093279-aebe-45ae-944b-9d99c97262ee roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
192352025-03-07T23:30:43.527ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 96093279-aebe-45ae-944b-9d99c97262ee resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
192362025-03-07T23:30:43.544ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 040839d2-f595-476d-9b56-05a53f9de3be uri = /v1/groups
192372025-03-07T23:30:43.544ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 040839d2-f595-476d-9b56-05a53f9de3be uri = /v1/groups
192382025-03-07T23:30:43.544ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 040839d2-f595-476d-9b56-05a53f9de3be uri = /v1/groups
192392025-03-07T23:30:43.544ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 245 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 040839d2-f595-476d-9b56-05a53f9de3be response_code = 401 uri = /v1/groups
192402025-03-07T23:30:43.544ZINFOtest_unauthorized (external client test context): client received response status = 401
192412025-03-07T23:30:43.544ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/groups
192422025-03-07T23:30:43.544ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups
192432025-03-07T23:30:43.545ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 58fde89f-d0bb-415c-8d7c-30c81d8a4905 uri = /v1/groups
192442025-03-07T23:30:43.545ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 58fde89f-d0bb-415c-8d7c-30c81d8a4905 uri = /v1/groups
192452025-03-07T23:30:43.546ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:6669:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Group>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:6686:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Group>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<()>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Group>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 58fde89f-d0bb-415c-8d7c-30c81d8a4905 uri = /v1/groups
192462025-03-07T23:30:43.546ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1096 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 58fde89f-d0bb-415c-8d7c-30c81d8a4905 response_code = 401 uri = /v1/groups
192472025-03-07T23:30:43.546ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 20240 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 96093279-aebe-45ae-944b-9d99c97262ee response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
192482025-03-07T23:30:43.546ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "96093279-aebe-45ae-944b-9d99c97262ee", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:43 GMT"} })
192492025-03-07T23:30:43.546ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
192502025-03-07T23:30:43.546ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
192512025-03-07T23:30:43.546ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
192522025-03-07T23:30:43.547ZINFOtest_unauthorized (external client test context): client received response status = 401
192532025-03-07T23:30:43.547ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/groups
192542025-03-07T23:30:43.547ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups
192552025-03-07T23:30:43.547ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 158fca34-2753-4a60-ab46-3055a0a5cff5 uri = /v1/groups
192562025-03-07T23:30:43.547ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 158fca34-2753-4a60-ab46-3055a0a5cff5 response_code = 405 uri = /v1/groups
192572025-03-07T23:30:43.547ZINFOtest_unauthorized (external client test context): client received response status = 405
192582025-03-07T23:30:43.547ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/groups
192592025-03-07T23:30:43.547ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups
192602025-03-07T23:30:43.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3cb6fba2-c0ae-43c1-b7b7-625e11c0dd3f uri = /v1/groups
192612025-03-07T23:30:43.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3cb6fba2-c0ae-43c1-b7b7-625e11c0dd3f response_code = 405 uri = /v1/groups
192622025-03-07T23:30:43.548ZINFOtest_unauthorized (external client test context): client received response status = 405
192632025-03-07T23:30:43.548ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/groups
192642025-03-07T23:30:43.548ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups
192652025-03-07T23:30:43.548ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 10e6d557-2a08-4cca-b52a-03400c303d8e uri = /v1/groups
192662025-03-07T23:30:43.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 10e6d557-2a08-4cca-b52a-03400c303d8e response_code = 405 uri = /v1/groups
192672025-03-07T23:30:43.548ZINFOtest_unauthorized (external client test context): client received response status = 405
192682025-03-07T23:30:43.548ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/groups
192692025-03-07T23:30:43.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups
192702025-03-07T23:30:43.549ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 59f0b3ee-6182-4a8c-80b9-a05d4ab4a162 uri = /v1/groups
192712025-03-07T23:30:43.549ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 59f0b3ee-6182-4a8c-80b9-a05d4ab4a162 response_code = 405 uri = /v1/groups
192722025-03-07T23:30:43.549ZINFOtest_unauthorized (external client test context): client received response status = 405
192732025-03-07T23:30:43.549ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/groups
192742025-03-07T23:30:43.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups
192752025-03-07T23:30:43.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7fd6d7ee-22bc-4e81-82ed-3854b3c9367f uri = /v1/groups
192762025-03-07T23:30:43.550ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 597 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7fd6d7ee-22bc-4e81-82ed-3854b3c9367f response_code = 405 uri = /v1/groups
192772025-03-07T23:30:43.550ZINFOtest_unauthorized (external client test context): client received response status = 405
192782025-03-07T23:30:43.550ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/groups
192792025-03-07T23:30:43.550ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups
192802025-03-07T23:30:43.551ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1735d917-e900-4fde-b5ee-89f666a91b63 uri = /v1/groups
192812025-03-07T23:30:43.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1735d917-e900-4fde-b5ee-89f666a91b63 response_code = 405 uri = /v1/groups
192822025-03-07T23:30:43.551ZINFOtest_unauthorized (external client test context): client received response status = 405
192832025-03-07T23:30:43.551ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/groups
192842025-03-07T23:30:43.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups
192852025-03-07T23:30:43.551ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6fef1716-886f-4bfb-b5a5-29c25850021d uri = /v1/groups
192862025-03-07T23:30:43.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6fef1716-886f-4bfb-b5a5-29c25850021d response_code = 405 uri = /v1/groups
192872025-03-07T23:30:43.551ZINFOtest_unauthorized (external client test context): client received response status = 405
192882025-03-07T23:30:43.551ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/groups
192892025-03-07T23:30:43.551ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups
192902025-03-07T23:30:43.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 28313f6d-8409-4016-9c90-4c811730871d uri = /v1/groups
192912025-03-07T23:30:43.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 28313f6d-8409-4016-9c90-4c811730871d response_code = 405 uri = /v1/groups
192922025-03-07T23:30:43.552ZINFOtest_unauthorized (external client test context): client received response status = 405
192932025-03-07T23:30:43.552ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/groups
192942025-03-07T23:30:43.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups
192952025-03-07T23:30:43.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7bf965ab-7752-49c6-a255-d5c452c19ba3 uri = /v1/groups
192962025-03-07T23:30:43.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7bf965ab-7752-49c6-a255-d5c452c19ba3 response_code = 405 uri = /v1/groups
192972025-03-07T23:30:43.552ZINFOtest_unauthorized (external client test context): client received response status = 405
192982025-03-07T23:30:43.552ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/groups
192992025-03-07T23:30:43.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups
193002025-03-07T23:30:43.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b0d6614f-0ebf-4378-acd1-dca1feaf15c7 uri = /v1/groups
193012025-03-07T23:30:43.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b0d6614f-0ebf-4378-acd1-dca1feaf15c7 response_code = 405 uri = /v1/groups
193022025-03-07T23:30:43.553ZINFOtest_unauthorized (external client test context): client received response status = 405
193032025-03-07T23:30:43.553ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/groups
193042025-03-07T23:30:43.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups
193052025-03-07T23:30:43.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 07b380a2-a610-44f1-8c00-8998d90b30d6 uri = /v1/groups
193062025-03-07T23:30:43.553ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 07b380a2-a610-44f1-8c00-8998d90b30d6 response_code = 405 uri = /v1/groups
193072025-03-07T23:30:43.553ZINFOtest_unauthorized (external client test context): client received response status = 405
193082025-03-07T23:30:43.553ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/groups
193092025-03-07T23:30:43.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups
193102025-03-07T23:30:43.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5792102e-93c6-4f6e-9416-2abee374c4e2 uri = /v1/groups
193112025-03-07T23:30:43.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 93 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5792102e-93c6-4f6e-9416-2abee374c4e2 response_code = 405 uri = /v1/groups
193122025-03-07T23:30:43.554ZINFOtest_unauthorized (external client test context): client received response status = 405
193132025-03-07T23:30:43.554ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/groups
193142025-03-07T23:30:43.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups
193152025-03-07T23:30:43.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3e8eb85-f190-49e6-9e49-92c15be104ec uri = /v1/groups
193162025-03-07T23:30:43.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3e8eb85-f190-49e6-9e49-92c15be104ec response_code = 405 uri = /v1/groups
193172025-03-07T23:30:43.554ZINFOtest_unauthorized (external client test context): client received response status = 405
193182025-03-07T23:30:43.554ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/groups
193192025-03-07T23:30:43.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups
193202025-03-07T23:30:43.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 261e4573-3eba-45a3-bf6d-d9de1175465b uri = /v1/groups
193212025-03-07T23:30:43.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 261e4573-3eba-45a3-bf6d-d9de1175465b response_code = 405 uri = /v1/groups
193222025-03-07T23:30:43.555ZINFOtest_unauthorized (external client test context): client received response status = 405
193232025-03-07T23:30:43.555ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/groups
193242025-03-07T23:30:43.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups
193252025-03-07T23:30:43.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e308b5f4-d3b2-44d5-9b9f-b636524a228b uri = /v1/groups
193262025-03-07T23:30:43.555ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e308b5f4-d3b2-44d5-9b9f-b636524a228b response_code = 405 uri = /v1/groups
193272025-03-07T23:30:43.555ZINFOtest_unauthorized (external client test context): client received response status = 405
193282025-03-07T23:30:43.555ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/groups
193292025-03-07T23:30:43.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups
193302025-03-07T23:30:43.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f181a949-2800-41c6-934a-b5804636affa uri = /v1/groups
193312025-03-07T23:30:43.555ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f181a949-2800-41c6-934a-b5804636affa response_code = 405 uri = /v1/groups
193322025-03-07T23:30:43.556ZINFOtest_unauthorized (external client test context): client received response status = 405
193332025-03-07T23:30:43.556ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/groups
193342025-03-07T23:30:43.556ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups
193352025-03-07T23:30:43.557ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 uri = /v1/groups
193362025-03-07T23:30:43.557ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 uri = /v1/groups
193372025-03-07T23:30:43.557ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/groups
193382025-03-07T23:30:43.557ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193392025-03-07T23:30:43.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193402025-03-07T23:30:43.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193412025-03-07T23:30:43.565ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
193422025-03-07T23:30:43.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
193432025-03-07T23:30:43.565ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193442025-03-07T23:30:43.565ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193452025-03-07T23:30:43.566ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193462025-03-07T23:30:43.568ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
193472025-03-07T23:30:43.568ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
193482025-03-07T23:30:43.568ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
193492025-03-07T23:30:43.569ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
193502025-03-07T23:30:43.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
193512025-03-07T23:30:43.569ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
193522025-03-07T23:30:43.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193532025-03-07T23:30:43.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193542025-03-07T23:30:43.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193552025-03-07T23:30:43.573ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
193562025-03-07T23:30:43.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193572025-03-07T23:30:43.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193582025-03-07T23:30:43.574ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193592025-03-07T23:30:43.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
193602025-03-07T23:30:43.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
193612025-03-07T23:30:43.587ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193622025-03-07T23:30:43.587ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193632025-03-07T23:30:43.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193642025-03-07T23:30:43.592ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
193652025-03-07T23:30:43.592ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
193662025-03-07T23:30:43.592ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193672025-03-07T23:30:43.592ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193682025-03-07T23:30:43.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193692025-03-07T23:30:43.628ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
193702025-03-07T23:30:43.628ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
193712025-03-07T23:30:43.628ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
193722025-03-07T23:30:43.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
193732025-03-07T23:30:43.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
193742025-03-07T23:30:43.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
193752025-03-07T23:30:43.686ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 uri = /v1/groups
193762025-03-07T23:30:43.686ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/groups
193772025-03-07T23:30:43.686ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/groups
193782025-03-07T23:30:43.686ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Database uri = /v1/groups
193792025-03-07T23:30:43.686ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 roles = RoleSet { roles: {} } uri = /v1/groups
193802025-03-07T23:30:43.687ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Database result = Ok(()) uri = /v1/groups
193812025-03-07T23:30:43.706ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/groups
193822025-03-07T23:30:43.706ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Database uri = /v1/groups
193832025-03-07T23:30:43.706ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 roles = RoleSet { roles: {} } uri = /v1/groups
193842025-03-07T23:30:43.706ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Database result = Ok(()) uri = /v1/groups
193852025-03-07T23:30:43.715ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/groups
193862025-03-07T23:30:43.728ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/groups
193872025-03-07T23:30:43.728ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Database uri = /v1/groups
193882025-03-07T23:30:43.728ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 roles = RoleSet { roles: {} } uri = /v1/groups
193892025-03-07T23:30:43.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 resource = Database result = Ok(()) uri = /v1/groups
193902025-03-07T23:30:43.732ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 175603 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5242647-35e1-41c7-b764-49e092905572 response_code = 200 uri = /v1/groups
193912025-03-07T23:30:43.740ZINFOtest_unauthorized (external client test context): client received response status = 200
193922025-03-07T23:30:43.740ZINFOtest_unauthorized: test: begin endpoint url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193932025-03-07T23:30:43.740ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193942025-03-07T23:30:43.740ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193952025-03-07T23:30:43.740ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193962025-03-07T23:30:43.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193972025-03-07T23:30:43.740ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193982025-03-07T23:30:43.741ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
193992025-03-07T23:30:43.741ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194002025-03-07T23:30:43.741ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194012025-03-07T23:30:43.741ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c resource = Database uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194022025-03-07T23:30:43.741ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c roles = RoleSet { roles: {} } uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194032025-03-07T23:30:43.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194042025-03-07T23:30:43.742ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1410 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7652fd6d-be49-426f-b5b9-358d29eed71c response_code = 401 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194052025-03-07T23:30:43.742ZINFOtest_unauthorized (external client test context): client received response status = 401
194062025-03-07T23:30:43.743ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194072025-03-07T23:30:43.743ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194082025-03-07T23:30:43.745ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24060e79-ee5f-4b4b-8e42-66b4ce936146 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194092025-03-07T23:30:43.746ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24060e79-ee5f-4b4b-8e42-66b4ce936146 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194102025-03-07T23:30:43.746ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24060e79-ee5f-4b4b-8e42-66b4ce936146 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194112025-03-07T23:30:43.746ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1577 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 24060e79-ee5f-4b4b-8e42-66b4ce936146 response_code = 401 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194122025-03-07T23:30:43.760ZINFOtest_unauthorized (external client test context): client received response status = 401
194132025-03-07T23:30:43.760ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194142025-03-07T23:30:43.760ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194152025-03-07T23:30:43.761ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fc5d265-860f-4906-a889-fa9497f473c3 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194162025-03-07T23:30:43.765ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fc5d265-860f-4906-a889-fa9497f473c3 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194172025-03-07T23:30:43.766ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:6698:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Group>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:6707:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Group>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::group_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::GroupPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Group>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fc5d265-860f-4906-a889-fa9497f473c3 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194182025-03-07T23:30:43.766ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5463 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fc5d265-860f-4906-a889-fa9497f473c3 response_code = 401 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194192025-03-07T23:30:43.767ZINFOtest_unauthorized (external client test context): client received response status = 401
194202025-03-07T23:30:43.767ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194212025-03-07T23:30:43.767ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194222025-03-07T23:30:43.769ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0026c850-c128-43f7-a35f-ec55226e1894 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194232025-03-07T23:30:43.769ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 84 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0026c850-c128-43f7-a35f-ec55226e1894 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194242025-03-07T23:30:43.774ZINFOtest_unauthorized (external client test context): client received response status = 405
194252025-03-07T23:30:43.774ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194262025-03-07T23:30:43.775ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194272025-03-07T23:30:43.775ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aaa6d6b3-9f33-4a8f-b1d6-79e52c9fc510 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194282025-03-07T23:30:43.775ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aaa6d6b3-9f33-4a8f-b1d6-79e52c9fc510 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194292025-03-07T23:30:43.779ZINFOtest_unauthorized (external client test context): client received response status = 405
194302025-03-07T23:30:43.779ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194312025-03-07T23:30:43.779ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194322025-03-07T23:30:43.781ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 374f25de-4ff4-4537-a96f-66db908b47b7 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194332025-03-07T23:30:43.781ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 374f25de-4ff4-4537-a96f-66db908b47b7 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194342025-03-07T23:30:43.783ZINFOtest_unauthorized (external client test context): client received response status = 405
194352025-03-07T23:30:43.783ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194362025-03-07T23:30:43.784ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194372025-03-07T23:30:43.784ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 01d96c7d-e3c5-4465-ba25-5566ccfb9c99 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194382025-03-07T23:30:43.784ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 01d96c7d-e3c5-4465-ba25-5566ccfb9c99 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194392025-03-07T23:30:43.792ZINFOtest_unauthorized (external client test context): client received response status = 405
194402025-03-07T23:30:43.792ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194412025-03-07T23:30:43.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194422025-03-07T23:30:43.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0be32fd7-b936-4ab8-9ba0-e345e8ef80eb uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194432025-03-07T23:30:43.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0be32fd7-b936-4ab8-9ba0-e345e8ef80eb response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194442025-03-07T23:30:43.793ZINFOtest_unauthorized (external client test context): client received response status = 405
194452025-03-07T23:30:43.793ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194462025-03-07T23:30:43.793ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194472025-03-07T23:30:43.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e667fa9-b452-4597-a92c-61a706aa288f uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194482025-03-07T23:30:43.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0e667fa9-b452-4597-a92c-61a706aa288f response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194492025-03-07T23:30:43.801ZINFOtest_unauthorized (external client test context): client received response status = 405
194502025-03-07T23:30:43.801ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194512025-03-07T23:30:43.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194522025-03-07T23:30:43.801ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0b43794b-d498-4431-9e27-2863992f135e uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194532025-03-07T23:30:43.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0b43794b-d498-4431-9e27-2863992f135e response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194542025-03-07T23:30:43.801ZINFOtest_unauthorized (external client test context): client received response status = 405
194552025-03-07T23:30:43.801ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194562025-03-07T23:30:43.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194572025-03-07T23:30:43.801ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 879c869a-57db-4998-9df6-00f7c389722f uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194582025-03-07T23:30:43.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 879c869a-57db-4998-9df6-00f7c389722f response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194592025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client received response status = 405
194602025-03-07T23:30:43.802ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194612025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194622025-03-07T23:30:43.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = de74fb8c-3e6d-42f6-830e-b1a723cd65d5 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194632025-03-07T23:30:43.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = de74fb8c-3e6d-42f6-830e-b1a723cd65d5 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194642025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client received response status = 405
194652025-03-07T23:30:43.802ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194662025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194672025-03-07T23:30:43.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58a5a873-fc85-4b6d-b664-0d61767b1a03 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194682025-03-07T23:30:43.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58a5a873-fc85-4b6d-b664-0d61767b1a03 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194692025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client received response status = 405
194702025-03-07T23:30:43.802ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194712025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194722025-03-07T23:30:43.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 047cab77-ea3e-44e4-b452-5fd6f4b9e3e0 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194732025-03-07T23:30:43.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 047cab77-ea3e-44e4-b452-5fd6f4b9e3e0 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194742025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client received response status = 405
194752025-03-07T23:30:43.802ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194762025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194772025-03-07T23:30:43.802ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2236f371-60d1-4e96-aab1-c4660e07ab4d uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194782025-03-07T23:30:43.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2236f371-60d1-4e96-aab1-c4660e07ab4d response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194792025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client received response status = 405
194802025-03-07T23:30:43.802ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194812025-03-07T23:30:43.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194822025-03-07T23:30:43.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d0f76118-0f22-4e86-b287-d00526837510 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194832025-03-07T23:30:43.803ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d0f76118-0f22-4e86-b287-d00526837510 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194842025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client received response status = 405
194852025-03-07T23:30:43.803ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194862025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194872025-03-07T23:30:43.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 937f03a4-1278-4ee3-a0ed-a6b282f6757d uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194882025-03-07T23:30:43.803ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 937f03a4-1278-4ee3-a0ed-a6b282f6757d response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194892025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client received response status = 405
194902025-03-07T23:30:43.803ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194912025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194922025-03-07T23:30:43.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5ee429fa-9431-44d9-ace0-1416b646b416 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194932025-03-07T23:30:43.803ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5ee429fa-9431-44d9-ace0-1416b646b416 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194942025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client received response status = 405
194952025-03-07T23:30:43.803ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194962025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194972025-03-07T23:30:43.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c36c73f1-769e-4896-8e07-a2da08baa521 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194982025-03-07T23:30:43.803ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c36c73f1-769e-4896-8e07-a2da08baa521 response_code = 405 uri = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
194992025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client received response status = 405
195002025-03-07T23:30:43.803ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/groups/8d90b9a5-1cea-4a2b-9af4-71467dd33a04
195012025-03-07T23:30:43.803ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/users?silo=default-silo
195022025-03-07T23:30:43.803ZINFOtest_unauthorized: test: privileged GET url = /v1/system/users?silo=default-silo
195032025-03-07T23:30:43.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
195042025-03-07T23:30:43.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a uri = /v1/system/users?silo=default-silo
195052025-03-07T23:30:43.803ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a uri = /v1/system/users?silo=default-silo
195062025-03-07T23:30:43.804ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users?silo=default-silo
195072025-03-07T23:30:43.804ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195082025-03-07T23:30:43.804ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195092025-03-07T23:30:43.804ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195102025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195112025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195122025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195132025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
195142025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
195152025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195162025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195172025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195182025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
195192025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195202025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195212025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195222025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
195232025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
195242025-03-07T23:30:43.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195252025-03-07T23:30:43.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195262025-03-07T23:30:43.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195272025-03-07T23:30:43.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
195282025-03-07T23:30:43.832ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
195292025-03-07T23:30:43.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195302025-03-07T23:30:43.832ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195312025-03-07T23:30:43.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195322025-03-07T23:30:43.832ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
195332025-03-07T23:30:43.832ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
195342025-03-07T23:30:43.832ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
195352025-03-07T23:30:43.832ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
195362025-03-07T23:30:43.832ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
195372025-03-07T23:30:43.832ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
195382025-03-07T23:30:43.832ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
195392025-03-07T23:30:43.832ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
195402025-03-07T23:30:43.832ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
195412025-03-07T23:30:43.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
195422025-03-07T23:30:43.850ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
195432025-03-07T23:30:43.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
195442025-03-07T23:30:43.851ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a uri = /v1/system/users?silo=default-silo
195452025-03-07T23:30:43.851ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database uri = /v1/system/users?silo=default-silo
195462025-03-07T23:30:43.851ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195472025-03-07T23:30:43.852ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195482025-03-07T23:30:43.861ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users?silo=default-silo
195492025-03-07T23:30:43.861ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
195502025-03-07T23:30:43.861ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database uri = /v1/system/users?silo=default-silo
195512025-03-07T23:30:43.861ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195522025-03-07T23:30:43.861ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195532025-03-07T23:30:43.867ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
195542025-03-07T23:30:43.868ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database uri = /v1/system/users?silo=default-silo
195552025-03-07T23:30:43.868ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195562025-03-07T23:30:43.868ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195572025-03-07T23:30:43.874ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
195582025-03-07T23:30:43.879ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users?silo=default-silo
195592025-03-07T23:30:43.879ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/users?silo=default-silo
195602025-03-07T23:30:43.879ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
195612025-03-07T23:30:43.879ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database uri = /v1/system/users?silo=default-silo
195622025-03-07T23:30:43.879ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195632025-03-07T23:30:43.879ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195642025-03-07T23:30:43.881ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
195652025-03-07T23:30:43.881ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database uri = /v1/system/users?silo=default-silo
195662025-03-07T23:30:43.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195672025-03-07T23:30:43.881ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195682025-03-07T23:30:43.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
195692025-03-07T23:30:43.894ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Ok(()) uri = /v1/system/users?silo=default-silo
195702025-03-07T23:30:43.894ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database uri = /v1/system/users?silo=default-silo
195712025-03-07T23:30:43.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195722025-03-07T23:30:43.894ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
195732025-03-07T23:30:43.922ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 110849 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2aaf5cf8-1f7a-4d3c-8c82-73881d0bdc6a response_code = 200 uri = /v1/system/users?silo=default-silo
195742025-03-07T23:30:43.922ZINFOtest_unauthorized (external client test context): client received response status = 200
195752025-03-07T23:30:43.922ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/users?silo=default-silo
195762025-03-07T23:30:43.922ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/users?silo=default-silo
195772025-03-07T23:30:43.922ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
195782025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 uri = /v1/system/users?silo=default-silo
195792025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 uri = /v1/system/users?silo=default-silo
195802025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 uri = /v1/system/users?silo=default-silo
195812025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 uri = /v1/system/users?silo=default-silo
195822025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 resource = Database uri = /v1/system/users?silo=default-silo
195832025-03-07T23:30:43.922ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
195842025-03-07T23:30:43.922ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/users?silo=default-silo
195852025-03-07T23:30:43.922ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 772 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c5affc7-0203-44fa-84e1-87d9178bccb8 response_code = 401 uri = /v1/system/users?silo=default-silo
195862025-03-07T23:30:43.922ZINFOtest_unauthorized (external client test context): client received response status = 401
195872025-03-07T23:30:43.922ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/users?silo=default-silo
195882025-03-07T23:30:43.922ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
195892025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 323cf1ba-3af6-4650-bd15-28640dcdba7e uri = /v1/system/users?silo=default-silo
195902025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 323cf1ba-3af6-4650-bd15-28640dcdba7e uri = /v1/system/users?silo=default-silo
195912025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 323cf1ba-3af6-4650-bd15-28640dcdba7e uri = /v1/system/users?silo=default-silo
195922025-03-07T23:30:43.922ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 162 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 323cf1ba-3af6-4650-bd15-28640dcdba7e response_code = 401 uri = /v1/system/users?silo=default-silo
195932025-03-07T23:30:43.922ZINFOtest_unauthorized (external client test context): client received response status = 401
195942025-03-07T23:30:43.922ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/users?silo=default-silo
195952025-03-07T23:30:43.922ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
195962025-03-07T23:30:43.922ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a50e30ae-a6e1-40af-b0c1-40b388ceb135 uri = /v1/system/users?silo=default-silo
195972025-03-07T23:30:43.923ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a50e30ae-a6e1-40af-b0c1-40b388ceb135 uri = /v1/system/users?silo=default-silo
195982025-03-07T23:30:43.923ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:586:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:609:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanById<nexus_types::external_api::params::SiloSelector>, uuid::Uuid>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::User>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a50e30ae-a6e1-40af-b0c1-40b388ceb135 uri = /v1/system/users?silo=default-silo
195992025-03-07T23:30:43.923ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1152 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a50e30ae-a6e1-40af-b0c1-40b388ceb135 response_code = 401 uri = /v1/system/users?silo=default-silo
196002025-03-07T23:30:43.923ZINFOtest_unauthorized (external client test context): client received response status = 401
196012025-03-07T23:30:43.923ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/users?silo=default-silo
196022025-03-07T23:30:43.923ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196032025-03-07T23:30:43.923ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3e4cc053-2f40-4764-8e48-8d7ad8828cff uri = /v1/system/users?silo=default-silo
196042025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3e4cc053-2f40-4764-8e48-8d7ad8828cff response_code = 405 uri = /v1/system/users?silo=default-silo
196052025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client received response status = 405
196062025-03-07T23:30:43.924ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/users?silo=default-silo
196072025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196082025-03-07T23:30:43.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7b6fb92e-806e-4a55-8251-293325cda063 uri = /v1/system/users?silo=default-silo
196092025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 35 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7b6fb92e-806e-4a55-8251-293325cda063 response_code = 405 uri = /v1/system/users?silo=default-silo
196102025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client received response status = 405
196112025-03-07T23:30:43.924ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/users?silo=default-silo
196122025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196132025-03-07T23:30:43.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f3cde502-6c4a-4999-a810-425aecd8b042 uri = /v1/system/users?silo=default-silo
196142025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f3cde502-6c4a-4999-a810-425aecd8b042 response_code = 405 uri = /v1/system/users?silo=default-silo
196152025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client received response status = 405
196162025-03-07T23:30:43.924ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/users?silo=default-silo
196172025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196182025-03-07T23:30:43.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efdc6bef-596b-40e7-90a9-434704cffeb5 uri = /v1/system/users?silo=default-silo
196192025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 35 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efdc6bef-596b-40e7-90a9-434704cffeb5 response_code = 405 uri = /v1/system/users?silo=default-silo
196202025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client received response status = 405
196212025-03-07T23:30:43.924ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/users?silo=default-silo
196222025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196232025-03-07T23:30:43.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1128b06b-bfd9-4976-87b0-36c6cf9d2e9a uri = /v1/system/users?silo=default-silo
196242025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1128b06b-bfd9-4976-87b0-36c6cf9d2e9a response_code = 405 uri = /v1/system/users?silo=default-silo
196252025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client received response status = 405
196262025-03-07T23:30:43.924ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/users?silo=default-silo
196272025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196282025-03-07T23:30:43.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b1d8dbf2-1e4d-4822-bc63-a73e0f18b0c4 uri = /v1/system/users?silo=default-silo
196292025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b1d8dbf2-1e4d-4822-bc63-a73e0f18b0c4 response_code = 405 uri = /v1/system/users?silo=default-silo
196302025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client received response status = 405
196312025-03-07T23:30:43.924ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/users?silo=default-silo
196322025-03-07T23:30:43.924ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196332025-03-07T23:30:43.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b9bc6788-07d2-4008-9160-e32dd746f490 uri = /v1/system/users?silo=default-silo
196342025-03-07T23:30:43.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b9bc6788-07d2-4008-9160-e32dd746f490 response_code = 405 uri = /v1/system/users?silo=default-silo
196352025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196362025-03-07T23:30:43.925ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/users?silo=default-silo
196372025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196382025-03-07T23:30:43.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c06ca7bc-8d3f-4e7e-87dd-2b727cd8ac0e uri = /v1/system/users?silo=default-silo
196392025-03-07T23:30:43.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 35 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c06ca7bc-8d3f-4e7e-87dd-2b727cd8ac0e response_code = 405 uri = /v1/system/users?silo=default-silo
196402025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196412025-03-07T23:30:43.925ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/users?silo=default-silo
196422025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196432025-03-07T23:30:43.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2582fd2b-32ba-43cb-8c2b-4df98a971fb3 uri = /v1/system/users?silo=default-silo
196442025-03-07T23:30:43.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2582fd2b-32ba-43cb-8c2b-4df98a971fb3 response_code = 405 uri = /v1/system/users?silo=default-silo
196452025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196462025-03-07T23:30:43.925ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/users?silo=default-silo
196472025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196482025-03-07T23:30:43.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 12d45542-33c2-41ce-8614-80531c2a55b4 uri = /v1/system/users?silo=default-silo
196492025-03-07T23:30:43.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 12d45542-33c2-41ce-8614-80531c2a55b4 response_code = 405 uri = /v1/system/users?silo=default-silo
196502025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196512025-03-07T23:30:43.925ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/users?silo=default-silo
196522025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196532025-03-07T23:30:43.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 13817888-1ced-4db4-abbc-e68be6a52db0 uri = /v1/system/users?silo=default-silo
196542025-03-07T23:30:43.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 13817888-1ced-4db4-abbc-e68be6a52db0 response_code = 405 uri = /v1/system/users?silo=default-silo
196552025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196562025-03-07T23:30:43.925ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/users?silo=default-silo
196572025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196582025-03-07T23:30:43.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0f1f71fe-0540-490f-871d-62f0a211bb3a uri = /v1/system/users?silo=default-silo
196592025-03-07T23:30:43.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0f1f71fe-0540-490f-871d-62f0a211bb3a response_code = 405 uri = /v1/system/users?silo=default-silo
196602025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196612025-03-07T23:30:43.925ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/users?silo=default-silo
196622025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196632025-03-07T23:30:43.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e83d76f0-2e0c-4365-b0f3-00f834aa4b47 uri = /v1/system/users?silo=default-silo
196642025-03-07T23:30:43.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 34 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e83d76f0-2e0c-4365-b0f3-00f834aa4b47 response_code = 405 uri = /v1/system/users?silo=default-silo
196652025-03-07T23:30:43.925ZINFOtest_unauthorized (external client test context): client received response status = 405
196662025-03-07T23:30:43.925ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/users?silo=default-silo
196672025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196682025-03-07T23:30:43.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 03f8390d-855c-47b4-b19a-0bcbe09e66a3 uri = /v1/system/users?silo=default-silo
196692025-03-07T23:30:43.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 35 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 03f8390d-855c-47b4-b19a-0bcbe09e66a3 response_code = 405 uri = /v1/system/users?silo=default-silo
196702025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client received response status = 405
196712025-03-07T23:30:43.926ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/users?silo=default-silo
196722025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196732025-03-07T23:30:43.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6a8cac95-a4a6-4d62-bd6c-e2972b5224a5 uri = /v1/system/users?silo=default-silo
196742025-03-07T23:30:43.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6a8cac95-a4a6-4d62-bd6c-e2972b5224a5 response_code = 405 uri = /v1/system/users?silo=default-silo
196752025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client received response status = 405
196762025-03-07T23:30:43.926ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/users?silo=default-silo
196772025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196782025-03-07T23:30:43.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c2bb2905-c5a3-4845-a8db-0365a9ca2180 uri = /v1/system/users?silo=default-silo
196792025-03-07T23:30:43.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c2bb2905-c5a3-4845-a8db-0365a9ca2180 response_code = 405 uri = /v1/system/users?silo=default-silo
196802025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client received response status = 405
196812025-03-07T23:30:43.926ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/users?silo=default-silo
196822025-03-07T23:30:43.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users?silo=default-silo
196832025-03-07T23:30:43.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 uri = /v1/system/users?silo=default-silo
196842025-03-07T23:30:43.926ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 uri = /v1/system/users?silo=default-silo
196852025-03-07T23:30:43.926ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users?silo=default-silo
196862025-03-07T23:30:43.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196872025-03-07T23:30:43.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196882025-03-07T23:30:43.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196892025-03-07T23:30:43.930ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196902025-03-07T23:30:43.930ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196912025-03-07T23:30:43.930ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196922025-03-07T23:30:43.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
196932025-03-07T23:30:43.945ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
196942025-03-07T23:30:43.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196952025-03-07T23:30:43.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
196962025-03-07T23:30:43.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
196972025-03-07T23:30:43.955ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
196982025-03-07T23:30:43.955ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
196992025-03-07T23:30:43.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197002025-03-07T23:30:43.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197012025-03-07T23:30:43.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
197022025-03-07T23:30:43.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
197032025-03-07T23:30:43.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197042025-03-07T23:30:43.974ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197052025-03-07T23:30:43.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197062025-03-07T23:30:43.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
197072025-03-07T23:30:43.974ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
197082025-03-07T23:30:43.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197092025-03-07T23:30:43.974ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197102025-03-07T23:30:43.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197112025-03-07T23:30:43.983ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
197122025-03-07T23:30:43.983ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197132025-03-07T23:30:43.983ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197142025-03-07T23:30:43.983ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197152025-03-07T23:30:43.996ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
197162025-03-07T23:30:43.996ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
197172025-03-07T23:30:43.996ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 uri = /v1/system/users?silo=default-silo
197182025-03-07T23:30:43.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database uri = /v1/system/users?silo=default-silo
197192025-03-07T23:30:43.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
197202025-03-07T23:30:43.996ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
197212025-03-07T23:30:43.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users?silo=default-silo
197222025-03-07T23:30:43.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
197232025-03-07T23:30:43.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database uri = /v1/system/users?silo=default-silo
197242025-03-07T23:30:43.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
197252025-03-07T23:30:44.004ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
197262025-03-07T23:30:44.005ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
197272025-03-07T23:30:44.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database uri = /v1/system/users?silo=default-silo
197282025-03-07T23:30:44.005ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
197292025-03-07T23:30:44.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
197302025-03-07T23:30:44.012ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
197312025-03-07T23:30:44.014ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users?silo=default-silo
197322025-03-07T23:30:44.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/users?silo=default-silo
197332025-03-07T23:30:44.015ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users?silo=default-silo
197342025-03-07T23:30:44.015ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database uri = /v1/system/users?silo=default-silo
197352025-03-07T23:30:44.015ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
197362025-03-07T23:30:44.015ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
197372025-03-07T23:30:44.018ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users?silo=default-silo
197382025-03-07T23:30:44.018ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database uri = /v1/system/users?silo=default-silo
197392025-03-07T23:30:44.018ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
197402025-03-07T23:30:44.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
197412025-03-07T23:30:44.021ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users?silo=default-silo
197422025-03-07T23:30:44.027ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Ok(()) uri = /v1/system/users?silo=default-silo
197432025-03-07T23:30:44.027ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database uri = /v1/system/users?silo=default-silo
197442025-03-07T23:30:44.027ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 roles = RoleSet { roles: {} } uri = /v1/system/users?silo=default-silo
197452025-03-07T23:30:44.028ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 resource = Database result = Ok(()) uri = /v1/system/users?silo=default-silo
197462025-03-07T23:30:44.030ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 108013 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fb024ce6-5e6a-4989-be58-d7366a1c6d44 response_code = 200 uri = /v1/system/users?silo=default-silo
197472025-03-07T23:30:44.030ZINFOtest_unauthorized (external client test context): client received response status = 200
197482025-03-07T23:30:44.031ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/identity-providers/local/users?silo=default-silo
197492025-03-07T23:30:44.031ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/identity-providers/local/users?silo=default-silo
197502025-03-07T23:30:44.031ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
197512025-03-07T23:30:44.031ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
197522025-03-07T23:30:44.031ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197532025-03-07T23:30:44.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 090097a6-0822-4b1f-b24c-117381e11425 uri = /v1/system/identity-providers/local/users?silo=default-silo
197542025-03-07T23:30:44.031ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 090097a6-0822-4b1f-b24c-117381e11425 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197552025-03-07T23:30:44.031ZINFOtest_unauthorized (external client test context): client received response status = 405
197562025-03-07T23:30:44.031ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
197572025-03-07T23:30:44.031ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197582025-03-07T23:30:44.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa37c793-ef6b-4bbe-9250-89d7a81e36be uri = /v1/system/identity-providers/local/users?silo=default-silo
197592025-03-07T23:30:44.032ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa37c793-ef6b-4bbe-9250-89d7a81e36be response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197602025-03-07T23:30:44.032ZINFOtest_unauthorized (external client test context): client received response status = 405
197612025-03-07T23:30:44.032ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/identity-providers/local/users?silo=default-silo
197622025-03-07T23:30:44.032ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197632025-03-07T23:30:44.032ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c37c393-699f-4b19-8092-0c0cf1eb8ccf uri = /v1/system/identity-providers/local/users?silo=default-silo
197642025-03-07T23:30:44.032ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c37c393-699f-4b19-8092-0c0cf1eb8ccf response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197652025-03-07T23:30:44.032ZINFOtest_unauthorized (external client test context): client received response status = 405
197662025-03-07T23:30:44.032ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
197672025-03-07T23:30:44.032ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197682025-03-07T23:30:44.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7c5ca771-1718-462f-88c2-cc39b3e4b995 uri = /v1/system/identity-providers/local/users?silo=default-silo
197692025-03-07T23:30:44.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7c5ca771-1718-462f-88c2-cc39b3e4b995 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197702025-03-07T23:30:44.033ZINFOtest_unauthorized (external client test context): client received response status = 405
197712025-03-07T23:30:44.033ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
197722025-03-07T23:30:44.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197732025-03-07T23:30:44.033ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6da7fc4d-9667-4f62-ad47-d0a631f2edcc uri = /v1/system/identity-providers/local/users?silo=default-silo
197742025-03-07T23:30:44.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6da7fc4d-9667-4f62-ad47-d0a631f2edcc response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197752025-03-07T23:30:44.033ZINFOtest_unauthorized (external client test context): client received response status = 405
197762025-03-07T23:30:44.033ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
197772025-03-07T23:30:44.034ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197782025-03-07T23:30:44.042ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 323956e6-e2dd-46ac-aa4c-0d4a5045eb9b uri = /v1/system/identity-providers/local/users?silo=default-silo
197792025-03-07T23:30:44.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 2130 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 323956e6-e2dd-46ac-aa4c-0d4a5045eb9b response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197802025-03-07T23:30:44.046ZINFOtest_unauthorized (external client test context): client received response status = 405
197812025-03-07T23:30:44.046ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/identity-providers/local/users?silo=default-silo
197822025-03-07T23:30:44.046ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197832025-03-07T23:30:44.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17408d4f-9991-4a0d-a043-f53eb85eadde uri = /v1/system/identity-providers/local/users?silo=default-silo
197842025-03-07T23:30:44.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17408d4f-9991-4a0d-a043-f53eb85eadde response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
197852025-03-07T23:30:44.047ZINFOtest_unauthorized (external client test context): client received response status = 405
197862025-03-07T23:30:44.047ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
197872025-03-07T23:30:44.047ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
197882025-03-07T23:30:44.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff uri = /v1/system/identity-providers/local/users?silo=default-silo
197892025-03-07T23:30:44.048ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff uri = /v1/system/identity-providers/local/users?silo=default-silo
197902025-03-07T23:30:44.048ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/identity-providers/local/users?silo=default-silo
197912025-03-07T23:30:44.048ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197922025-03-07T23:30:44.048ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197932025-03-07T23:30:44.049ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197942025-03-07T23:30:44.051ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
197952025-03-07T23:30:44.051ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
197962025-03-07T23:30:44.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
197972025-03-07T23:30:44.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
197982025-03-07T23:30:44.053ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
197992025-03-07T23:30:44.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
198002025-03-07T23:30:44.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
198012025-03-07T23:30:44.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
198022025-03-07T23:30:44.055ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
198032025-03-07T23:30:44.055ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
198042025-03-07T23:30:44.056ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
198052025-03-07T23:30:44.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
198062025-03-07T23:30:44.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
198072025-03-07T23:30:44.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
198082025-03-07T23:30:44.062ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
198092025-03-07T23:30:44.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
198102025-03-07T23:30:44.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
198112025-03-07T23:30:44.064ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
198122025-03-07T23:30:44.064ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
198132025-03-07T23:30:44.064ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
198142025-03-07T23:30:44.064ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
198152025-03-07T23:30:44.065ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
198162025-03-07T23:30:44.067ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
198172025-03-07T23:30:44.067ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
198182025-03-07T23:30:44.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
198192025-03-07T23:30:44.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
198202025-03-07T23:30:44.069ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
198212025-03-07T23:30:44.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
198222025-03-07T23:30:44.072ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff uri = /v1/system/identity-providers/local/users?silo=default-silo
198232025-03-07T23:30:44.072ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
198242025-03-07T23:30:44.072ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198252025-03-07T23:30:44.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
198262025-03-07T23:30:44.078ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users?silo=default-silo
198272025-03-07T23:30:44.078ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
198282025-03-07T23:30:44.078ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
198292025-03-07T23:30:44.078ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198302025-03-07T23:30:44.079ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
198312025-03-07T23:30:44.082ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
198322025-03-07T23:30:44.083ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
198332025-03-07T23:30:44.083ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198342025-03-07T23:30:44.084ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
198352025-03-07T23:30:44.089ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198362025-03-07T23:30:44.093ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
198372025-03-07T23:30:44.093ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) uri = /v1/system/identity-providers/local/users?silo=default-silo
198382025-03-07T23:30:44.094ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users?silo=default-silo
198392025-03-07T23:30:44.094ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
198402025-03-07T23:30:44.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198412025-03-07T23:30:44.094ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
198422025-03-07T23:30:44.117ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users?silo=default-silo
198432025-03-07T23:30:44.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
198442025-03-07T23:30:44.117ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198452025-03-07T23:30:44.118ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users?silo=default-silo
198462025-03-07T23:30:44.122ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198472025-03-07T23:30:44.129ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff resource = SiloUserList(Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }) result = Err(Forbidden) uri = /v1/system/identity-providers/local/users?silo=default-silo
198482025-03-07T23:30:44.129ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 81703 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9937977f-03a1-4b2b-8f57-d72d8e5490ff response_code = 403 uri = /v1/system/identity-providers/local/users?silo=default-silo
198492025-03-07T23:30:44.130ZINFOtest_unauthorized (external client test context): client received response status = 403
198502025-03-07T23:30:44.130ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
198512025-03-07T23:30:44.130ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198522025-03-07T23:30:44.130ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d uri = /v1/system/identity-providers/local/users?silo=default-silo
198532025-03-07T23:30:44.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d uri = /v1/system/identity-providers/local/users?silo=default-silo
198542025-03-07T23:30:44.131ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d uri = /v1/system/identity-providers/local/users?silo=default-silo
198552025-03-07T23:30:44.131ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d uri = /v1/system/identity-providers/local/users?silo=default-silo
198562025-03-07T23:30:44.131ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d resource = Database uri = /v1/system/identity-providers/local/users?silo=default-silo
198572025-03-07T23:30:44.131ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users?silo=default-silo
198582025-03-07T23:30:44.131ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/identity-providers/local/users?silo=default-silo
198592025-03-07T23:30:44.131ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 745 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9b4bd12e-3ea6-409e-a43d-e2125a35410d response_code = 401 uri = /v1/system/identity-providers/local/users?silo=default-silo
198602025-03-07T23:30:44.131ZINFOtest_unauthorized (external client test context): client received response status = 401
198612025-03-07T23:30:44.131ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
198622025-03-07T23:30:44.132ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198632025-03-07T23:30:44.132ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dee3475b-c14f-438e-a893-9b22079b24b5 uri = /v1/system/identity-providers/local/users?silo=default-silo
198642025-03-07T23:30:44.132ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dee3475b-c14f-438e-a893-9b22079b24b5 uri = /v1/system/identity-providers/local/users?silo=default-silo
198652025-03-07T23:30:44.132ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dee3475b-c14f-438e-a893-9b22079b24b5 uri = /v1/system/identity-providers/local/users?silo=default-silo
198662025-03-07T23:30:44.132ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 231 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dee3475b-c14f-438e-a893-9b22079b24b5 response_code = 401 uri = /v1/system/identity-providers/local/users?silo=default-silo
198672025-03-07T23:30:44.132ZINFOtest_unauthorized (external client test context): client received response status = 401
198682025-03-07T23:30:44.132ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/identity-providers/local/users?silo=default-silo
198692025-03-07T23:30:44.132ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198702025-03-07T23:30:44.132ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fe224536-1331-4e32-97fb-102bfbef3433 uri = /v1/system/identity-providers/local/users?silo=default-silo
198712025-03-07T23:30:44.132ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fe224536-1331-4e32-97fb-102bfbef3433 uri = /v1/system/identity-providers/local/users?silo=default-silo
198722025-03-07T23:30:44.134ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:749:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::User>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:766:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::User>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::User>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fe224536-1331-4e32-97fb-102bfbef3433 uri = /v1/system/identity-providers/local/users?silo=default-silo
198732025-03-07T23:30:44.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1163 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fe224536-1331-4e32-97fb-102bfbef3433 response_code = 401 uri = /v1/system/identity-providers/local/users?silo=default-silo
198742025-03-07T23:30:44.134ZINFOtest_unauthorized (external client test context): client received response status = 401
198752025-03-07T23:30:44.134ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
198762025-03-07T23:30:44.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198772025-03-07T23:30:44.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 269c1c38-28a9-457a-bc1d-04c39149f3e4 uri = /v1/system/identity-providers/local/users?silo=default-silo
198782025-03-07T23:30:44.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 269c1c38-28a9-457a-bc1d-04c39149f3e4 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
198792025-03-07T23:30:44.134ZINFOtest_unauthorized (external client test context): client received response status = 405
198802025-03-07T23:30:44.134ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
198812025-03-07T23:30:44.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198822025-03-07T23:30:44.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b3fb804b-7b56-4207-8bd4-d7b92f9ee4e6 uri = /v1/system/identity-providers/local/users?silo=default-silo
198832025-03-07T23:30:44.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 94 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b3fb804b-7b56-4207-8bd4-d7b92f9ee4e6 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
198842025-03-07T23:30:44.135ZINFOtest_unauthorized (external client test context): client received response status = 405
198852025-03-07T23:30:44.135ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
198862025-03-07T23:30:44.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198872025-03-07T23:30:44.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9c5430a-80bb-4153-a254-b144934ebde7 uri = /v1/system/identity-providers/local/users?silo=default-silo
198882025-03-07T23:30:44.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9c5430a-80bb-4153-a254-b144934ebde7 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
198892025-03-07T23:30:44.135ZINFOtest_unauthorized (external client test context): client received response status = 405
198902025-03-07T23:30:44.135ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/identity-providers/local/users?silo=default-silo
198912025-03-07T23:30:44.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198922025-03-07T23:30:44.136ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 73e9802f-76c7-49e4-a127-f635862b8fea uri = /v1/system/identity-providers/local/users?silo=default-silo
198932025-03-07T23:30:44.136ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 73e9802f-76c7-49e4-a127-f635862b8fea response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
198942025-03-07T23:30:44.136ZINFOtest_unauthorized (external client test context): client received response status = 405
198952025-03-07T23:30:44.136ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
198962025-03-07T23:30:44.136ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
198972025-03-07T23:30:44.137ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 91648a52-e5fc-458f-ba09-f4d7f417dadc uri = /v1/system/identity-providers/local/users?silo=default-silo
198982025-03-07T23:30:44.137ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 91648a52-e5fc-458f-ba09-f4d7f417dadc response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
198992025-03-07T23:30:44.137ZINFOtest_unauthorized (external client test context): client received response status = 405
199002025-03-07T23:30:44.137ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
199012025-03-07T23:30:44.137ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
199022025-03-07T23:30:44.137ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3c07ea6b-4937-4e99-96ea-e8396e4fad26 uri = /v1/system/identity-providers/local/users?silo=default-silo
199032025-03-07T23:30:44.137ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3c07ea6b-4937-4e99-96ea-e8396e4fad26 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
199042025-03-07T23:30:44.137ZINFOtest_unauthorized (external client test context): client received response status = 405
199052025-03-07T23:30:44.137ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
199062025-03-07T23:30:44.137ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
199072025-03-07T23:30:44.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cfd10c19-762d-4d8a-983a-b118c35a19c0 uri = /v1/system/identity-providers/local/users?silo=default-silo
199082025-03-07T23:30:44.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cfd10c19-762d-4d8a-983a-b118c35a19c0 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
199092025-03-07T23:30:44.138ZINFOtest_unauthorized (external client test context): client received response status = 405
199102025-03-07T23:30:44.138ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/identity-providers/local/users?silo=default-silo
199112025-03-07T23:30:44.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users?silo=default-silo
199122025-03-07T23:30:44.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5e33edf2-5737-49c3-9df9-42ca4d7a9db4 uri = /v1/system/identity-providers/local/users?silo=default-silo
199132025-03-07T23:30:44.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5e33edf2-5737-49c3-9df9-42ca4d7a9db4 response_code = 405 uri = /v1/system/identity-providers/local/users?silo=default-silo
199142025-03-07T23:30:44.138ZINFOtest_unauthorized (external client test context): client received response status = 405
199152025-03-07T23:30:44.138ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/identity-providers/local/users?silo=default-silo
199162025-03-07T23:30:44.138ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/users/{id}?silo=default-silo
199172025-03-07T23:30:44.139ZINFOtest_unauthorized: test: privileged GET url = /v1/system/users/{id}?silo=default-silo
199182025-03-07T23:30:44.139ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199192025-03-07T23:30:44.139ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199202025-03-07T23:30:44.139ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199212025-03-07T23:30:44.139ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199222025-03-07T23:30:44.139ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199232025-03-07T23:30:44.139ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199242025-03-07T23:30:44.140ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199252025-03-07T23:30:44.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199262025-03-07T23:30:44.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199272025-03-07T23:30:44.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199282025-03-07T23:30:44.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
199292025-03-07T23:30:44.147ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
199302025-03-07T23:30:44.147ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199312025-03-07T23:30:44.147ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199322025-03-07T23:30:44.148ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199332025-03-07T23:30:44.152ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
199342025-03-07T23:30:44.153ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199352025-03-07T23:30:44.153ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199362025-03-07T23:30:44.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199372025-03-07T23:30:44.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
199382025-03-07T23:30:44.159ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
199392025-03-07T23:30:44.159ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199402025-03-07T23:30:44.159ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199412025-03-07T23:30:44.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199422025-03-07T23:30:44.160ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
199432025-03-07T23:30:44.160ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
199442025-03-07T23:30:44.160ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
199452025-03-07T23:30:44.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
199462025-03-07T23:30:44.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
199472025-03-07T23:30:44.165ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
199482025-03-07T23:30:44.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199492025-03-07T23:30:44.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199502025-03-07T23:30:44.166ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199512025-03-07T23:30:44.166ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
199522025-03-07T23:30:44.166ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
199532025-03-07T23:30:44.169ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
199542025-03-07T23:30:44.169ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
199552025-03-07T23:30:44.169ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
199562025-03-07T23:30:44.170ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
199572025-03-07T23:30:44.170ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
199582025-03-07T23:30:44.170ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
199592025-03-07T23:30:44.173ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
199602025-03-07T23:30:44.176ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
199612025-03-07T23:30:44.176ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199622025-03-07T23:30:44.176ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199632025-03-07T23:30:44.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199642025-03-07T23:30:44.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199652025-03-07T23:30:44.180ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199662025-03-07T23:30:44.180ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199672025-03-07T23:30:44.180ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199682025-03-07T23:30:44.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199692025-03-07T23:30:44.181ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199702025-03-07T23:30:44.184ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199712025-03-07T23:30:44.184ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199722025-03-07T23:30:44.184ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199732025-03-07T23:30:44.185ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199742025-03-07T23:30:44.190ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199752025-03-07T23:30:44.193ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199762025-03-07T23:30:44.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199772025-03-07T23:30:44.194ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199782025-03-07T23:30:44.195ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199792025-03-07T23:30:44.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199802025-03-07T23:30:44.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199812025-03-07T23:30:44.205ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199822025-03-07T23:30:44.208ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199832025-03-07T23:30:44.208ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199842025-03-07T23:30:44.208ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199852025-03-07T23:30:44.208ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199862025-03-07T23:30:44.208ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199872025-03-07T23:30:44.213ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199882025-03-07T23:30:44.213ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199892025-03-07T23:30:44.213ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199902025-03-07T23:30:44.214ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199912025-03-07T23:30:44.258ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199922025-03-07T23:30:44.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199932025-03-07T23:30:44.267ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 128078 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8fea39df-1962-4e06-aace-47c44e05169d response_code = 200 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199942025-03-07T23:30:44.270ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
199952025-03-07T23:30:44.271ZINFOtest_unauthorized (external client test context): client received response status = 200
199962025-03-07T23:30:44.272ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/users/{id}?silo=default-silo
199972025-03-07T23:30:44.272ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/users/{id}?silo=default-silo
199982025-03-07T23:30:44.272ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
199992025-03-07T23:30:44.272ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200002025-03-07T23:30:44.272ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200012025-03-07T23:30:44.272ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200022025-03-07T23:30:44.272ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200032025-03-07T23:30:44.272ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200042025-03-07T23:30:44.272ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200052025-03-07T23:30:44.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200062025-03-07T23:30:44.273ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 1179 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd327365-57e8-45e1-a4ea-debe94e1fafa response_code = 401 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200072025-03-07T23:30:44.273ZINFOtest_unauthorized (external client test context): client received response status = 401
200082025-03-07T23:30:44.273ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/users/{id}?silo=default-silo
200092025-03-07T23:30:44.273ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200102025-03-07T23:30:44.274ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f6f6966e-de3c-4f7e-84e6-66aa64350082 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200112025-03-07T23:30:44.274ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f6f6966e-de3c-4f7e-84e6-66aa64350082 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200122025-03-07T23:30:44.274ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f6f6966e-de3c-4f7e-84e6-66aa64350082 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200132025-03-07T23:30:44.274ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 181 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f6f6966e-de3c-4f7e-84e6-66aa64350082 response_code = 401 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200142025-03-07T23:30:44.274ZINFOtest_unauthorized (external client test context): client received response status = 401
200152025-03-07T23:30:44.274ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/users/{id}?silo=default-silo
200162025-03-07T23:30:44.274ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200172025-03-07T23:30:44.274ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 70d41b48-815d-4cf1-a6a1-5441fd6345c7 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200182025-03-07T23:30:44.274ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 70d41b48-815d-4cf1-a6a1-5441fd6345c7 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200192025-03-07T23:30:44.276ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:620:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::User>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:634:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::User>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::silo_user_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::User>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 70d41b48-815d-4cf1-a6a1-5441fd6345c7 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200202025-03-07T23:30:44.276ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1516 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 70d41b48-815d-4cf1-a6a1-5441fd6345c7 response_code = 401 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200212025-03-07T23:30:44.276ZINFOtest_unauthorized (external client test context): client received response status = 401
200222025-03-07T23:30:44.276ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/users/{id}?silo=default-silo
200232025-03-07T23:30:44.276ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200242025-03-07T23:30:44.276ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 95848055-cbf1-4cf2-8b6f-beab6588f6cb uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200252025-03-07T23:30:44.276ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 95848055-cbf1-4cf2-8b6f-beab6588f6cb response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200262025-03-07T23:30:44.277ZINFOtest_unauthorized (external client test context): client received response status = 405
200272025-03-07T23:30:44.277ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/users/{id}?silo=default-silo
200282025-03-07T23:30:44.277ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200292025-03-07T23:30:44.277ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8270064f-c3be-40c9-8fda-92658a7dcda0 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200302025-03-07T23:30:44.277ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8270064f-c3be-40c9-8fda-92658a7dcda0 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200312025-03-07T23:30:44.277ZINFOtest_unauthorized (external client test context): client received response status = 405
200322025-03-07T23:30:44.277ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/users/{id}?silo=default-silo
200332025-03-07T23:30:44.277ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200342025-03-07T23:30:44.277ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4281c242-67fa-4505-bcf9-55dd7e3efb7a uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200352025-03-07T23:30:44.277ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 95 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4281c242-67fa-4505-bcf9-55dd7e3efb7a response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200362025-03-07T23:30:44.278ZINFOtest_unauthorized (external client test context): client received response status = 405
200372025-03-07T23:30:44.278ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/users/{id}?silo=default-silo
200382025-03-07T23:30:44.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200392025-03-07T23:30:44.288ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9b6b0ebb-1ded-4639-b874-adc7de26b7dd uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200402025-03-07T23:30:44.288ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 103 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9b6b0ebb-1ded-4639-b874-adc7de26b7dd response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200412025-03-07T23:30:44.288ZINFOtest_unauthorized (external client test context): client received response status = 405
200422025-03-07T23:30:44.288ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/users/{id}?silo=default-silo
200432025-03-07T23:30:44.288ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200442025-03-07T23:30:44.289ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61d40474-3994-4017-b147-b83e1ebb00a4 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200452025-03-07T23:30:44.289ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61d40474-3994-4017-b147-b83e1ebb00a4 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200462025-03-07T23:30:44.289ZINFOtest_unauthorized (external client test context): client received response status = 405
200472025-03-07T23:30:44.289ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/users/{id}?silo=default-silo
200482025-03-07T23:30:44.289ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200492025-03-07T23:30:44.289ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2c672a94-8a8a-41d8-8a7d-7d8ce9d851f0 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200502025-03-07T23:30:44.289ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2c672a94-8a8a-41d8-8a7d-7d8ce9d851f0 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200512025-03-07T23:30:44.289ZINFOtest_unauthorized (external client test context): client received response status = 405
200522025-03-07T23:30:44.289ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/users/{id}?silo=default-silo
200532025-03-07T23:30:44.290ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200542025-03-07T23:30:44.290ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 34c7c48b-fa19-402a-89b9-2fcceb7eb77c uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200552025-03-07T23:30:44.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 34c7c48b-fa19-402a-89b9-2fcceb7eb77c response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200562025-03-07T23:30:44.290ZINFOtest_unauthorized (external client test context): client received response status = 405
200572025-03-07T23:30:44.290ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/users/{id}?silo=default-silo
200582025-03-07T23:30:44.290ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200592025-03-07T23:30:44.290ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 608eec50-e503-4209-a5d4-8efae502b43f uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200602025-03-07T23:30:44.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 608eec50-e503-4209-a5d4-8efae502b43f response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200612025-03-07T23:30:44.290ZINFOtest_unauthorized (external client test context): client received response status = 405
200622025-03-07T23:30:44.291ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/users/{id}?silo=default-silo
200632025-03-07T23:30:44.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200642025-03-07T23:30:44.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d0011d85-d6e8-4a4e-b49a-a1eff660ebc5 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200652025-03-07T23:30:44.291ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d0011d85-d6e8-4a4e-b49a-a1eff660ebc5 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200662025-03-07T23:30:44.291ZINFOtest_unauthorized (external client test context): client received response status = 405
200672025-03-07T23:30:44.291ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/users/{id}?silo=default-silo
200682025-03-07T23:30:44.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200692025-03-07T23:30:44.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5bb08a4d-5676-41bf-8643-f4585e4785d9 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200702025-03-07T23:30:44.291ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5bb08a4d-5676-41bf-8643-f4585e4785d9 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200712025-03-07T23:30:44.292ZINFOtest_unauthorized (external client test context): client received response status = 405
200722025-03-07T23:30:44.292ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/users/{id}?silo=default-silo
200732025-03-07T23:30:44.292ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200742025-03-07T23:30:44.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1ed8ea86-fdd1-4ecd-81ec-4b5baeb6cf46 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200752025-03-07T23:30:44.292ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1ed8ea86-fdd1-4ecd-81ec-4b5baeb6cf46 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200762025-03-07T23:30:44.292ZINFOtest_unauthorized (external client test context): client received response status = 405
200772025-03-07T23:30:44.292ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/users/{id}?silo=default-silo
200782025-03-07T23:30:44.292ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200792025-03-07T23:30:44.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b2067231-58b9-4cc7-9b44-343b276b75f8 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200802025-03-07T23:30:44.293ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b2067231-58b9-4cc7-9b44-343b276b75f8 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200812025-03-07T23:30:44.293ZINFOtest_unauthorized (external client test context): client received response status = 405
200822025-03-07T23:30:44.293ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/users/{id}?silo=default-silo
200832025-03-07T23:30:44.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200842025-03-07T23:30:44.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2a4c533c-f3df-499e-ae52-047fd657ff8b uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200852025-03-07T23:30:44.293ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2a4c533c-f3df-499e-ae52-047fd657ff8b response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200862025-03-07T23:30:44.293ZINFOtest_unauthorized (external client test context): client received response status = 405
200872025-03-07T23:30:44.293ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/users/{id}?silo=default-silo
200882025-03-07T23:30:44.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200892025-03-07T23:30:44.302ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f121d1da-ce3c-43d6-bad9-a056b18b1660 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200902025-03-07T23:30:44.302ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 296 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f121d1da-ce3c-43d6-bad9-a056b18b1660 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200912025-03-07T23:30:44.303ZINFOtest_unauthorized (external client test context): client received response status = 405
200922025-03-07T23:30:44.303ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/users/{id}?silo=default-silo
200932025-03-07T23:30:44.305ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200942025-03-07T23:30:44.305ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 64cd2291-bb86-440a-98d4-2c3873ed96eb uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200952025-03-07T23:30:44.305ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 76 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 64cd2291-bb86-440a-98d4-2c3873ed96eb response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200962025-03-07T23:30:44.305ZINFOtest_unauthorized (external client test context): client received response status = 405
200972025-03-07T23:30:44.305ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/users/{id}?silo=default-silo
200982025-03-07T23:30:44.306ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
200992025-03-07T23:30:44.306ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 343fbb27-3558-4d13-8502-051174105dc5 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201002025-03-07T23:30:44.306ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 343fbb27-3558-4d13-8502-051174105dc5 response_code = 405 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201012025-03-07T23:30:44.306ZINFOtest_unauthorized (external client test context): client received response status = 405
201022025-03-07T23:30:44.306ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/users/{id}?silo=default-silo
201032025-03-07T23:30:44.306ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201042025-03-07T23:30:44.306ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201052025-03-07T23:30:44.306ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201062025-03-07T23:30:44.306ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201072025-03-07T23:30:44.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201082025-03-07T23:30:44.307ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201092025-03-07T23:30:44.307ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201102025-03-07T23:30:44.320ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201112025-03-07T23:30:44.320ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201122025-03-07T23:30:44.321ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201132025-03-07T23:30:44.348ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
201142025-03-07T23:30:44.349ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
201152025-03-07T23:30:44.349ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201162025-03-07T23:30:44.349ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201172025-03-07T23:30:44.350ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201182025-03-07T23:30:44.380ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
201192025-03-07T23:30:44.380ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201202025-03-07T23:30:44.380ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201212025-03-07T23:30:44.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201222025-03-07T23:30:44.391ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
201232025-03-07T23:30:44.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
201242025-03-07T23:30:44.396ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201252025-03-07T23:30:44.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201262025-03-07T23:30:44.397ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201272025-03-07T23:30:44.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
201282025-03-07T23:30:44.400ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
201292025-03-07T23:30:44.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201302025-03-07T23:30:44.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201312025-03-07T23:30:44.401ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201322025-03-07T23:30:44.415ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
201332025-03-07T23:30:44.415ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
201342025-03-07T23:30:44.415ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
201352025-03-07T23:30:44.417ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
201362025-03-07T23:30:44.438ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
201372025-03-07T23:30:44.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
201382025-03-07T23:30:44.443ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201392025-03-07T23:30:44.443ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201402025-03-07T23:30:44.443ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201412025-03-07T23:30:44.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201422025-03-07T23:30:44.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201432025-03-07T23:30:44.447ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201442025-03-07T23:30:44.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201452025-03-07T23:30:44.447ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201462025-03-07T23:30:44.448ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201472025-03-07T23:30:44.451ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201482025-03-07T23:30:44.451ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201492025-03-07T23:30:44.451ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201502025-03-07T23:30:44.452ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201512025-03-07T23:30:44.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201522025-03-07T23:30:44.474ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201532025-03-07T23:30:44.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201542025-03-07T23:30:44.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201552025-03-07T23:30:44.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201562025-03-07T23:30:44.480ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201572025-03-07T23:30:44.480ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201582025-03-07T23:30:44.481ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201592025-03-07T23:30:44.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201602025-03-07T23:30:44.508ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201612025-03-07T23:30:44.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201622025-03-07T23:30:44.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201632025-03-07T23:30:44.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201642025-03-07T23:30:44.513ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201652025-03-07T23:30:44.513ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201662025-03-07T23:30:44.513ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201672025-03-07T23:30:44.513ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = Database result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201682025-03-07T23:30:44.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201692025-03-07T23:30:44.533ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } result = Ok(()) uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201702025-03-07T23:30:44.533ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 226985 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4f241bf0-45b6-4753-ae05-a02a8dd0a330 response_code = 200 uri = /v1/system/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201712025-03-07T23:30:44.537ZINFOtest_unauthorized (external client test context): client received response status = 200
201722025-03-07T23:30:44.537ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201732025-03-07T23:30:44.537ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201742025-03-07T23:30:44.537ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201752025-03-07T23:30:44.538ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201762025-03-07T23:30:44.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201772025-03-07T23:30:44.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 84aa7a35-d56f-4c20-b0c1-98aaf3e412fb uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201782025-03-07T23:30:44.538ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 257 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 84aa7a35-d56f-4c20-b0c1-98aaf3e412fb response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201792025-03-07T23:30:44.538ZINFOtest_unauthorized (external client test context): client received response status = 405
201802025-03-07T23:30:44.538ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201812025-03-07T23:30:44.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201822025-03-07T23:30:44.539ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 46ac20bb-eeb9-4139-8624-fc8c03da5965 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201832025-03-07T23:30:44.539ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 158 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 46ac20bb-eeb9-4139-8624-fc8c03da5965 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201842025-03-07T23:30:44.541ZINFOtest_unauthorized (external client test context): client received response status = 405
201852025-03-07T23:30:44.541ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201862025-03-07T23:30:44.541ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201872025-03-07T23:30:44.541ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 32f03d89-e632-45c8-a3c4-956a0d30858a uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201882025-03-07T23:30:44.541ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 32f03d89-e632-45c8-a3c4-956a0d30858a response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201892025-03-07T23:30:44.541ZINFOtest_unauthorized (external client test context): client received response status = 405
201902025-03-07T23:30:44.541ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201912025-03-07T23:30:44.541ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201922025-03-07T23:30:44.541ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 219560a2-357b-4e23-8bba-f8132cb08181 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201932025-03-07T23:30:44.541ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 219560a2-357b-4e23-8bba-f8132cb08181 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201942025-03-07T23:30:44.541ZINFOtest_unauthorized (external client test context): client received response status = 405
201952025-03-07T23:30:44.541ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
201962025-03-07T23:30:44.541ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201972025-03-07T23:30:44.541ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3174534a-df30-4e8b-ab91-9c63706c6457 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201982025-03-07T23:30:44.542ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3174534a-df30-4e8b-ab91-9c63706c6457 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
201992025-03-07T23:30:44.542ZINFOtest_unauthorized (external client test context): client received response status = 405
202002025-03-07T23:30:44.542ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202012025-03-07T23:30:44.542ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202022025-03-07T23:30:44.542ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7965234b-56af-4d9d-be45-1354c97a0759 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202032025-03-07T23:30:44.542ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7965234b-56af-4d9d-be45-1354c97a0759 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202042025-03-07T23:30:44.542ZINFOtest_unauthorized (external client test context): client received response status = 405
202052025-03-07T23:30:44.542ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202062025-03-07T23:30:44.542ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202072025-03-07T23:30:44.542ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3b48103c-959c-4223-b509-a75dcc8a42ea uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202082025-03-07T23:30:44.542ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3b48103c-959c-4223-b509-a75dcc8a42ea response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202092025-03-07T23:30:44.543ZINFOtest_unauthorized (external client test context): client received response status = 405
202102025-03-07T23:30:44.543ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202112025-03-07T23:30:44.543ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202122025-03-07T23:30:44.543ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6b09048-62b6-477d-af3e-a1aa79c9c21d uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202132025-03-07T23:30:44.543ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d6b09048-62b6-477d-af3e-a1aa79c9c21d response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202142025-03-07T23:30:44.543ZINFOtest_unauthorized (external client test context): client received response status = 405
202152025-03-07T23:30:44.543ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202162025-03-07T23:30:44.543ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202172025-03-07T23:30:44.543ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 77bedad8-106c-47bb-ad9e-580fa8d740f0 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202182025-03-07T23:30:44.543ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 77bedad8-106c-47bb-ad9e-580fa8d740f0 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202192025-03-07T23:30:44.544ZINFOtest_unauthorized (external client test context): client received response status = 405
202202025-03-07T23:30:44.544ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202212025-03-07T23:30:44.544ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202222025-03-07T23:30:44.544ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2611212a-383c-4e82-bc5f-982068d06a43 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202232025-03-07T23:30:44.544ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2611212a-383c-4e82-bc5f-982068d06a43 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202242025-03-07T23:30:44.544ZINFOtest_unauthorized (external client test context): client received response status = 405
202252025-03-07T23:30:44.544ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202262025-03-07T23:30:44.544ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202272025-03-07T23:30:44.544ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 45403b36-ca07-4578-8c1c-592fdae33225 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202282025-03-07T23:30:44.544ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 45403b36-ca07-4578-8c1c-592fdae33225 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202292025-03-07T23:30:44.545ZINFOtest_unauthorized (external client test context): client received response status = 405
202302025-03-07T23:30:44.545ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
202312025-03-07T23:30:44.545ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202322025-03-07T23:30:44.545ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202332025-03-07T23:30:44.545ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202342025-03-07T23:30:44.545ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202352025-03-07T23:30:44.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202362025-03-07T23:30:44.545ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202372025-03-07T23:30:44.546ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202382025-03-07T23:30:44.554ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202392025-03-07T23:30:44.555ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202402025-03-07T23:30:44.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202412025-03-07T23:30:44.558ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
202422025-03-07T23:30:44.559ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
202432025-03-07T23:30:44.559ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202442025-03-07T23:30:44.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202452025-03-07T23:30:44.559ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202462025-03-07T23:30:44.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
202472025-03-07T23:30:44.561ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
202482025-03-07T23:30:44.562ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
202492025-03-07T23:30:44.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202502025-03-07T23:30:44.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202512025-03-07T23:30:44.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202522025-03-07T23:30:44.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
202532025-03-07T23:30:44.565ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
202542025-03-07T23:30:44.565ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
202552025-03-07T23:30:44.565ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
202562025-03-07T23:30:44.565ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
202572025-03-07T23:30:44.571ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
202582025-03-07T23:30:44.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202592025-03-07T23:30:44.571ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202602025-03-07T23:30:44.572ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202612025-03-07T23:30:44.576ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
202622025-03-07T23:30:44.576ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
202632025-03-07T23:30:44.576ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202642025-03-07T23:30:44.576ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202652025-03-07T23:30:44.578ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202662025-03-07T23:30:44.583ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
202672025-03-07T23:30:44.583ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
202682025-03-07T23:30:44.583ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
202692025-03-07T23:30:44.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
202702025-03-07T23:30:44.586ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
202712025-03-07T23:30:44.594ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
202722025-03-07T23:30:44.594ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202732025-03-07T23:30:44.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202742025-03-07T23:30:44.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202752025-03-07T23:30:44.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202762025-03-07T23:30:44.597ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202772025-03-07T23:30:44.598ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202782025-03-07T23:30:44.598ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202792025-03-07T23:30:44.598ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202802025-03-07T23:30:44.598ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202812025-03-07T23:30:44.601ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202822025-03-07T23:30:44.601ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202832025-03-07T23:30:44.601ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202842025-03-07T23:30:44.602ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202852025-03-07T23:30:44.605ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202862025-03-07T23:30:44.608ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202872025-03-07T23:30:44.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202882025-03-07T23:30:44.608ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202892025-03-07T23:30:44.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202902025-03-07T23:30:44.611ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202912025-03-07T23:30:44.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202922025-03-07T23:30:44.612ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202932025-03-07T23:30:44.615ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202942025-03-07T23:30:44.615ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202952025-03-07T23:30:44.615ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202962025-03-07T23:30:44.615ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202972025-03-07T23:30:44.615ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202982025-03-07T23:30:44.618ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
202992025-03-07T23:30:44.618ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203002025-03-07T23:30:44.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203012025-03-07T23:30:44.619ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203022025-03-07T23:30:44.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203032025-03-07T23:30:44.636ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } result = Err(Forbidden) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203042025-03-07T23:30:44.636ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 91236 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 56843ea1-fba0-4828-b570-a433a4351f71 response_code = 403 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203052025-03-07T23:30:44.637ZINFOtest_unauthorized (external client test context): client received response status = 403
203062025-03-07T23:30:44.637ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203072025-03-07T23:30:44.637ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203082025-03-07T23:30:44.637ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203092025-03-07T23:30:44.638ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203102025-03-07T23:30:44.638ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203112025-03-07T23:30:44.638ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203122025-03-07T23:30:44.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203132025-03-07T23:30:44.638ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203142025-03-07T23:30:44.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203152025-03-07T23:30:44.638ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 743 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e3cadc47-6fbc-4959-b1b3-7b60b31b127a response_code = 401 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203162025-03-07T23:30:44.638ZINFOtest_unauthorized (external client test context): client received response status = 401
203172025-03-07T23:30:44.638ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203182025-03-07T23:30:44.639ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203192025-03-07T23:30:44.639ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 84481c33-58de-4c1c-9e7b-9e263f7b74bd uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203202025-03-07T23:30:44.639ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 84481c33-58de-4c1c-9e7b-9e263f7b74bd uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203212025-03-07T23:30:44.639ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 84481c33-58de-4c1c-9e7b-9e263f7b74bd uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203222025-03-07T23:30:44.639ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 209 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 84481c33-58de-4c1c-9e7b-9e263f7b74bd response_code = 401 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203232025-03-07T23:30:44.639ZINFOtest_unauthorized (external client test context): client received response status = 401
203242025-03-07T23:30:44.640ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203252025-03-07T23:30:44.640ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203262025-03-07T23:30:44.640ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 08650e86-5399-4c50-b4ec-28e3418d2050 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203272025-03-07T23:30:44.640ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 08650e86-5399-4c50-b4ec-28e3418d2050 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203282025-03-07T23:30:44.642ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:777:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:791:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 08650e86-5399-4c50-b4ec-28e3418d2050 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203292025-03-07T23:30:44.642ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1413 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 08650e86-5399-4c50-b4ec-28e3418d2050 response_code = 401 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203302025-03-07T23:30:44.642ZINFOtest_unauthorized (external client test context): client received response status = 401
203312025-03-07T23:30:44.642ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203322025-03-07T23:30:44.642ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203332025-03-07T23:30:44.642ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dbd215f2-e1f0-4c16-b410-72c3f31a91b8 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203342025-03-07T23:30:44.642ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dbd215f2-e1f0-4c16-b410-72c3f31a91b8 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203352025-03-07T23:30:44.642ZINFOtest_unauthorized (external client test context): client received response status = 405
203362025-03-07T23:30:44.642ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203372025-03-07T23:30:44.642ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203382025-03-07T23:30:44.642ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2c4d4b8a-a027-4925-9a24-931a75c0040c uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203392025-03-07T23:30:44.642ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2c4d4b8a-a027-4925-9a24-931a75c0040c response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203402025-03-07T23:30:44.643ZINFOtest_unauthorized (external client test context): client received response status = 405
203412025-03-07T23:30:44.643ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203422025-03-07T23:30:44.643ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203432025-03-07T23:30:44.643ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70ef26b6-a780-405f-aef5-b1a5f492e0ba uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203442025-03-07T23:30:44.643ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70ef26b6-a780-405f-aef5-b1a5f492e0ba response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203452025-03-07T23:30:44.643ZINFOtest_unauthorized (external client test context): client received response status = 405
203462025-03-07T23:30:44.643ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203472025-03-07T23:30:44.643ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203482025-03-07T23:30:44.643ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3435cafd-7c4b-40a3-afe2-302696fc8a60 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203492025-03-07T23:30:44.643ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 112 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3435cafd-7c4b-40a3-afe2-302696fc8a60 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217?silo=default-silo
203502025-03-07T23:30:44.649ZINFOtest_unauthorized (external client test context): client received response status = 405
203512025-03-07T23:30:44.649ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/identity-providers/local/users/{id}?silo=default-silo
203522025-03-07T23:30:44.649ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203532025-03-07T23:30:44.649ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203542025-03-07T23:30:44.649ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203552025-03-07T23:30:44.649ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203562025-03-07T23:30:44.649ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203572025-03-07T23:30:44.649ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ca2793db-0a81-4daa-946c-8c043f8ad49e uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203582025-03-07T23:30:44.649ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ca2793db-0a81-4daa-946c-8c043f8ad49e response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203592025-03-07T23:30:44.649ZINFOtest_unauthorized (external client test context): client received response status = 405
203602025-03-07T23:30:44.649ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203612025-03-07T23:30:44.649ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203622025-03-07T23:30:44.649ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0a7b1a2-8517-4a59-ad76-82a0e355d15c uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203632025-03-07T23:30:44.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0a7b1a2-8517-4a59-ad76-82a0e355d15c response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203642025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client received response status = 405
203652025-03-07T23:30:44.650ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203662025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203672025-03-07T23:30:44.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd3c106c-3f4c-475e-9f09-37c3b77fe4f5 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203682025-03-07T23:30:44.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd3c106c-3f4c-475e-9f09-37c3b77fe4f5 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203692025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client received response status = 405
203702025-03-07T23:30:44.650ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203712025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203722025-03-07T23:30:44.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 46ed3f0d-b08b-4f95-8d48-8c7dbb0a2f46 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203732025-03-07T23:30:44.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 119 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 46ed3f0d-b08b-4f95-8d48-8c7dbb0a2f46 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203742025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client received response status = 405
203752025-03-07T23:30:44.650ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203762025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203772025-03-07T23:30:44.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bd56ea0a-8c1d-4885-919b-026d8f8eb5b7 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203782025-03-07T23:30:44.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = bd56ea0a-8c1d-4885-919b-026d8f8eb5b7 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203792025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client received response status = 405
203802025-03-07T23:30:44.650ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203812025-03-07T23:30:44.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203822025-03-07T23:30:44.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 432d6734-e118-4f87-be86-e2adc7219579 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203832025-03-07T23:30:44.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 432d6734-e118-4f87-be86-e2adc7219579 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203842025-03-07T23:30:44.651ZINFOtest_unauthorized (external client test context): client received response status = 405
203852025-03-07T23:30:44.651ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203862025-03-07T23:30:44.651ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203872025-03-07T23:30:44.651ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 12fbebc2-00d7-42b0-987c-1657607e36d3 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203882025-03-07T23:30:44.651ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 12fbebc2-00d7-42b0-987c-1657607e36d3 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203892025-03-07T23:30:44.651ZINFOtest_unauthorized (external client test context): client received response status = 405
203902025-03-07T23:30:44.651ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
203912025-03-07T23:30:44.651ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203922025-03-07T23:30:44.651ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203932025-03-07T23:30:44.651ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203942025-03-07T23:30:44.651ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
203952025-03-07T23:30:44.651ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203962025-03-07T23:30:44.651ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
203972025-03-07T23:30:44.651ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
203982025-03-07T23:30:44.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
203992025-03-07T23:30:44.653ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204002025-03-07T23:30:44.653ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204012025-03-07T23:30:44.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
204022025-03-07T23:30:44.656ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
204032025-03-07T23:30:44.656ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204042025-03-07T23:30:44.656ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204052025-03-07T23:30:44.656ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204062025-03-07T23:30:44.658ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
204072025-03-07T23:30:44.658ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204082025-03-07T23:30:44.658ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204092025-03-07T23:30:44.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204102025-03-07T23:30:44.659ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
204112025-03-07T23:30:44.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
204122025-03-07T23:30:44.663ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204132025-03-07T23:30:44.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204142025-03-07T23:30:44.664ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204152025-03-07T23:30:44.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
204162025-03-07T23:30:44.666ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
204172025-03-07T23:30:44.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204182025-03-07T23:30:44.666ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204192025-03-07T23:30:44.666ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204202025-03-07T23:30:44.669ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
204212025-03-07T23:30:44.669ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
204222025-03-07T23:30:44.669ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
204232025-03-07T23:30:44.669ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
204242025-03-07T23:30:44.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
204252025-03-07T23:30:44.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
204262025-03-07T23:30:44.677ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204272025-03-07T23:30:44.677ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204282025-03-07T23:30:44.677ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204292025-03-07T23:30:44.677ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204302025-03-07T23:30:44.679ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204312025-03-07T23:30:44.679ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204322025-03-07T23:30:44.679ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204332025-03-07T23:30:44.679ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204342025-03-07T23:30:44.679ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204352025-03-07T23:30:44.682ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204362025-03-07T23:30:44.682ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204372025-03-07T23:30:44.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204382025-03-07T23:30:44.683ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204392025-03-07T23:30:44.686ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204402025-03-07T23:30:44.688ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") } result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204412025-03-07T23:30:44.688ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204422025-03-07T23:30:44.688ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204432025-03-07T23:30:44.689ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204442025-03-07T23:30:44.690ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204452025-03-07T23:30:44.690ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204462025-03-07T23:30:44.691ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204472025-03-07T23:30:44.693ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204482025-03-07T23:30:44.694ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204492025-03-07T23:30:44.694ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204502025-03-07T23:30:44.694ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204512025-03-07T23:30:44.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204522025-03-07T23:30:44.695ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
204532025-03-07T23:30:44.695ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
204542025-03-07T23:30:44.696ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
204552025-03-07T23:30:44.699ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204562025-03-07T23:30:44.699ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204572025-03-07T23:30:44.699ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204582025-03-07T23:30:44.700ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = Database result = Ok(()) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204592025-03-07T23:30:44.704ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204602025-03-07T23:30:44.713ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: a55b5244-7f50-4e16-90a0-35985dd36217, lookup_type: ById(a55b5244-7f50-4e16-90a0-35985dd36217) } result = Err(Forbidden) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204612025-03-07T23:30:44.714ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 65790 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 721dc6d1-4133-4fca-bea0-367ebe3f64a2 response_code = 403 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204622025-03-07T23:30:44.714ZINFOtest_unauthorized (external client test context): client received response status = 403
204632025-03-07T23:30:44.715ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
204642025-03-07T23:30:44.716ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204652025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204662025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204672025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204682025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204692025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 resource = Database uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204702025-03-07T23:30:44.716ZDEBGtest_unauthorized (dropshot_external): roles authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 roles = RoleSet { roles: {} } uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204712025-03-07T23:30:44.716ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = None authenticated = false local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 resource = Database result = Err(Unauthenticated { internal_message: "authorization failed for unauthenticated request" }) uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204722025-03-07T23:30:44.716ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = authorization failed for unauthenticated request latency_us = 831 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a062a61e-2cc3-4542-b023-1ec97cd47ad5 response_code = 401 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204732025-03-07T23:30:44.716ZINFOtest_unauthorized (external client test context): client received response status = 401
204742025-03-07T23:30:44.716ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
204752025-03-07T23:30:44.716ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204762025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95c67d9a-8129-49b4-995f-85cacc1d5be9 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204772025-03-07T23:30:44.716ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95c67d9a-8129-49b4-995f-85cacc1d5be9 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204782025-03-07T23:30:44.717ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95c67d9a-8129-49b4-995f-85cacc1d5be9 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204792025-03-07T23:30:44.717ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 265 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95c67d9a-8129-49b4-995f-85cacc1d5be9 response_code = 401 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204802025-03-07T23:30:44.717ZINFOtest_unauthorized (external client test context): client received response status = 401
204812025-03-07T23:30:44.717ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
204822025-03-07T23:30:44.717ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204832025-03-07T23:30:44.717ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a8cfe7a8-8ea1-4238-b150-75d46bd38c32 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204842025-03-07T23:30:44.717ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a8cfe7a8-8ea1-4238-b150-75d46bd38c32 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204852025-03-07T23:30:44.718ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:803:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:822:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::local_idp_user_set_password::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::UserParam>, dropshot::extractor::query::Query<nexus_types::external_api::params::SiloPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::UserPassword>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a8cfe7a8-8ea1-4238-b150-75d46bd38c32 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204862025-03-07T23:30:44.718ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1114 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a8cfe7a8-8ea1-4238-b150-75d46bd38c32 response_code = 401 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204872025-03-07T23:30:44.718ZINFOtest_unauthorized (external client test context): client received response status = 401
204882025-03-07T23:30:44.718ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
204892025-03-07T23:30:44.718ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204902025-03-07T23:30:44.718ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 709a99f2-5e0a-4cc6-8b31-f434249495cd uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204912025-03-07T23:30:44.719ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 709a99f2-5e0a-4cc6-8b31-f434249495cd response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204922025-03-07T23:30:44.719ZINFOtest_unauthorized (external client test context): client received response status = 405
204932025-03-07T23:30:44.719ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
204942025-03-07T23:30:44.719ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204952025-03-07T23:30:44.719ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a263cbb1-e2da-4aca-8d87-2685d6d1700c uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204962025-03-07T23:30:44.719ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a263cbb1-e2da-4aca-8d87-2685d6d1700c response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
204972025-03-07T23:30:44.719ZINFOtest_unauthorized (external client test context): client received response status = 405
204982025-03-07T23:30:44.719ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
204992025-03-07T23:30:44.720ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205002025-03-07T23:30:44.720ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6aca47dd-3b14-4e09-acbd-88e6df94ee1c uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205012025-03-07T23:30:44.720ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6aca47dd-3b14-4e09-acbd-88e6df94ee1c response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205022025-03-07T23:30:44.720ZINFOtest_unauthorized (external client test context): client received response status = 405
205032025-03-07T23:30:44.720ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
205042025-03-07T23:30:44.720ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205052025-03-07T23:30:44.720ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 18bc23d6-3ec2-44ea-a977-369a68442a7e uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205062025-03-07T23:30:44.720ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 330 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 18bc23d6-3ec2-44ea-a977-369a68442a7e response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205072025-03-07T23:30:44.720ZINFOtest_unauthorized (external client test context): client received response status = 405
205082025-03-07T23:30:44.720ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
205092025-03-07T23:30:44.721ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205102025-03-07T23:30:44.721ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d4693a8c-64dc-422f-86a5-894799fa4169 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205112025-03-07T23:30:44.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d4693a8c-64dc-422f-86a5-894799fa4169 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205122025-03-07T23:30:44.721ZINFOtest_unauthorized (external client test context): client received response status = 405
205132025-03-07T23:30:44.721ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
205142025-03-07T23:30:44.721ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205152025-03-07T23:30:44.721ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 66306872-ccbd-4315-add4-4955cdad47e9 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205162025-03-07T23:30:44.721ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 66306872-ccbd-4315-add4-4955cdad47e9 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205172025-03-07T23:30:44.722ZINFOtest_unauthorized (external client test context): client received response status = 405
205182025-03-07T23:30:44.722ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
205192025-03-07T23:30:44.722ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205202025-03-07T23:30:44.722ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bd34e9d3-e469-4d12-89b3-ca203df982b0 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205212025-03-07T23:30:44.722ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bd34e9d3-e469-4d12-89b3-ca203df982b0 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205222025-03-07T23:30:44.722ZINFOtest_unauthorized (external client test context): client received response status = 405
205232025-03-07T23:30:44.722ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
205242025-03-07T23:30:44.722ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205252025-03-07T23:30:44.722ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8dc246e8-7d28-42a9-ab85-c4a8ad07b219 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205262025-03-07T23:30:44.722ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8dc246e8-7d28-42a9-ab85-c4a8ad07b219 response_code = 405 uri = /v1/system/identity-providers/local/users/a55b5244-7f50-4e16-90a0-35985dd36217/set-password?silo=default-silo
205272025-03-07T23:30:44.722ZINFOtest_unauthorized (external client test context): client received response status = 405
205282025-03-07T23:30:44.722ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/system/identity-providers/local/users/{id}/set-password?silo=default-silo
205292025-03-07T23:30:44.722ZINFOtest_unauthorized: test: begin endpoint url = /v1/projects
205302025-03-07T23:30:44.723ZINFOtest_unauthorized: test: privileged GET url = /v1/projects
205312025-03-07T23:30:44.723ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects
205322025-03-07T23:30:44.723ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 uri = /v1/projects
205332025-03-07T23:30:44.724ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 uri = /v1/projects
205342025-03-07T23:30:44.724ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
205352025-03-07T23:30:44.724ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205362025-03-07T23:30:44.724ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205372025-03-07T23:30:44.724ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205382025-03-07T23:30:44.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205392025-03-07T23:30:44.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205402025-03-07T23:30:44.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205412025-03-07T23:30:44.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
205422025-03-07T23:30:44.731ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
205432025-03-07T23:30:44.731ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205442025-03-07T23:30:44.731ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205452025-03-07T23:30:44.732ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205462025-03-07T23:30:44.734ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
205472025-03-07T23:30:44.735ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205482025-03-07T23:30:44.735ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205492025-03-07T23:30:44.735ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205502025-03-07T23:30:44.739ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
205512025-03-07T23:30:44.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
205522025-03-07T23:30:44.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205532025-03-07T23:30:44.739ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205542025-03-07T23:30:44.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205552025-03-07T23:30:44.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
205562025-03-07T23:30:44.747ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
205572025-03-07T23:30:44.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205582025-03-07T23:30:44.747ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205592025-03-07T23:30:44.749ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205602025-03-07T23:30:44.759ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
205612025-03-07T23:30:44.759ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205622025-03-07T23:30:44.759ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205632025-03-07T23:30:44.759ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205642025-03-07T23:30:44.772ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
205652025-03-07T23:30:44.778ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
205662025-03-07T23:30:44.778ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 uri = /v1/projects
205672025-03-07T23:30:44.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
205682025-03-07T23:30:44.778ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
205692025-03-07T23:30:44.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Database uri = /v1/projects
205702025-03-07T23:30:44.778ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 roles = RoleSet { roles: {} } uri = /v1/projects
205712025-03-07T23:30:44.778ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Database result = Ok(()) uri = /v1/projects
205722025-03-07T23:30:44.784ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
205732025-03-07T23:30:44.784ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Database uri = /v1/projects
205742025-03-07T23:30:44.784ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 roles = RoleSet { roles: {} } uri = /v1/projects
205752025-03-07T23:30:44.784ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Database result = Ok(()) uri = /v1/projects
205762025-03-07T23:30:44.790ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
205772025-03-07T23:30:44.793ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
205782025-03-07T23:30:44.793ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Database uri = /v1/projects
205792025-03-07T23:30:44.793ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 roles = RoleSet { roles: {} } uri = /v1/projects
205802025-03-07T23:30:44.794ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 resource = Database result = Ok(()) uri = /v1/projects
205812025-03-07T23:30:44.819ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 91114 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4641c38-3a0d-404e-9cf6-c464e00483d4 response_code = 200 uri = /v1/projects
205822025-03-07T23:30:44.819ZINFOtest_unauthorized (external client test context): client received response status = 200
205832025-03-07T23:30:44.819ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/projects
205842025-03-07T23:30:44.819ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects
205852025-03-07T23:30:44.819ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd uri = /v1/projects
205862025-03-07T23:30:44.819ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd uri = /v1/projects
205872025-03-07T23:30:44.819ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects
205882025-03-07T23:30:44.819ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205892025-03-07T23:30:44.819ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205902025-03-07T23:30:44.819ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205912025-03-07T23:30:44.821ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205922025-03-07T23:30:44.821ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205932025-03-07T23:30:44.822ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205942025-03-07T23:30:44.824ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
205952025-03-07T23:30:44.825ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
205962025-03-07T23:30:44.825ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
205972025-03-07T23:30:44.825ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
205982025-03-07T23:30:44.825ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
205992025-03-07T23:30:44.827ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
206002025-03-07T23:30:44.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206012025-03-07T23:30:44.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206022025-03-07T23:30:44.827ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206032025-03-07T23:30:44.833ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
206042025-03-07T23:30:44.833ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
206052025-03-07T23:30:44.834ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206062025-03-07T23:30:44.834ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206072025-03-07T23:30:44.834ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206082025-03-07T23:30:44.836ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
206092025-03-07T23:30:44.836ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
206102025-03-07T23:30:44.836ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206112025-03-07T23:30:44.836ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206122025-03-07T23:30:44.836ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206132025-03-07T23:30:44.839ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
206142025-03-07T23:30:44.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206152025-03-07T23:30:44.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206162025-03-07T23:30:44.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206172025-03-07T23:30:44.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
206182025-03-07T23:30:44.844ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
206192025-03-07T23:30:44.845ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd uri = /v1/projects
206202025-03-07T23:30:44.845ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
206212025-03-07T23:30:44.845ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
206222025-03-07T23:30:44.845ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource = Database uri = /v1/projects
206232025-03-07T23:30:44.845ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd roles = RoleSet { roles: {} } uri = /v1/projects
206242025-03-07T23:30:44.845ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource = Database result = Ok(()) uri = /v1/projects
206252025-03-07T23:30:44.849ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
206262025-03-07T23:30:44.849ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource = Database uri = /v1/projects
206272025-03-07T23:30:44.849ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd roles = RoleSet { roles: {} } uri = /v1/projects
206282025-03-07T23:30:44.849ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource = Database result = Ok(()) uri = /v1/projects
206292025-03-07T23:30:44.852ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd roles = RoleSet { roles: {} } uri = /v1/projects
206302025-03-07T23:30:44.870ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Err(Forbidden) uri = /v1/projects
206312025-03-07T23:30:44.870ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 44962 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a61a02b-c23a-487a-9853-c6983e7414dd response_code = 403 uri = /v1/projects
206322025-03-07T23:30:44.870ZINFOtest_unauthorized (external client test context): client received response status = 403
206332025-03-07T23:30:44.870ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/projects
206342025-03-07T23:30:44.870ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects
206352025-03-07T23:30:44.870ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f4cbe09c-466d-4ec8-9482-d29a5807cc88 uri = /v1/projects
206362025-03-07T23:30:44.870ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f4cbe09c-466d-4ec8-9482-d29a5807cc88 uri = /v1/projects
206372025-03-07T23:30:44.870ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f4cbe09c-466d-4ec8-9482-d29a5807cc88 uri = /v1/projects
206382025-03-07T23:30:44.870ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f4cbe09c-466d-4ec8-9482-d29a5807cc88 uri = /v1/projects
206392025-03-07T23:30:44.870ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = listing Projects: Actor required latency_us = 242 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f4cbe09c-466d-4ec8-9482-d29a5807cc88 response_code = 401 uri = /v1/projects
206402025-03-07T23:30:44.871ZINFOtest_unauthorized (external client test context): client received response status = 401
206412025-03-07T23:30:44.871ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/projects
206422025-03-07T23:30:44.871ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects
206432025-03-07T23:30:44.871ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a0b1f624-cdc9-4f22-9ac3-d815424c5935 uri = /v1/projects
206442025-03-07T23:30:44.871ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a0b1f624-cdc9-4f22-9ac3-d815424c5935 uri = /v1/projects
206452025-03-07T23:30:44.871ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a0b1f624-cdc9-4f22-9ac3-d815424c5935 uri = /v1/projects
206462025-03-07T23:30:44.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 158 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a0b1f624-cdc9-4f22-9ac3-d815424c5935 response_code = 401 uri = /v1/projects
206472025-03-07T23:30:44.871ZINFOtest_unauthorized (external client test context): client received response status = 401
206482025-03-07T23:30:44.871ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/projects
206492025-03-07T23:30:44.871ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects
206502025-03-07T23:30:44.871ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 04a1e937-9b15-4b2a-934d-f9084e9c484f uri = /v1/projects
206512025-03-07T23:30:44.871ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 04a1e937-9b15-4b2a-934d-f9084e9c484f uri = /v1/projects
206522025-03-07T23:30:44.871ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:837:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Project>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:854:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Project>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<()>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Project>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 04a1e937-9b15-4b2a-934d-f9084e9c484f uri = /v1/projects
206532025-03-07T23:30:44.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1286 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 04a1e937-9b15-4b2a-934d-f9084e9c484f response_code = 401 uri = /v1/projects
206542025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client received response status = 401
206552025-03-07T23:30:44.872ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/projects
206562025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects
206572025-03-07T23:30:44.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efc0cc55-ee66-43c6-a3bd-371cbb5bde4b uri = /v1/projects
206582025-03-07T23:30:44.872ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efc0cc55-ee66-43c6-a3bd-371cbb5bde4b response_code = 405 uri = /v1/projects
206592025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client received response status = 405
206602025-03-07T23:30:44.872ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/projects
206612025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects
206622025-03-07T23:30:44.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fb178267-fa06-48bf-a609-c712de05b4cc uri = /v1/projects
206632025-03-07T23:30:44.872ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fb178267-fa06-48bf-a609-c712de05b4cc response_code = 405 uri = /v1/projects
206642025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client received response status = 405
206652025-03-07T23:30:44.872ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/projects
206662025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects
206672025-03-07T23:30:44.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c72383f6-f112-462b-a3d5-ec0f03d4c2e8 uri = /v1/projects
206682025-03-07T23:30:44.872ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c72383f6-f112-462b-a3d5-ec0f03d4c2e8 response_code = 405 uri = /v1/projects
206692025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client received response status = 405
206702025-03-07T23:30:44.872ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/projects
206712025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects
206722025-03-07T23:30:44.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82acde6a-6994-4530-850f-6d34bdd28091 uri = /v1/projects
206732025-03-07T23:30:44.872ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82acde6a-6994-4530-850f-6d34bdd28091 response_code = 405 uri = /v1/projects
206742025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client received response status = 405
206752025-03-07T23:30:44.872ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/projects
206762025-03-07T23:30:44.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects
206772025-03-07T23:30:44.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc uri = /v1/projects
206782025-03-07T23:30:44.872ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc uri = /v1/projects
206792025-03-07T23:30:44.872ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects
206802025-03-07T23:30:44.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206812025-03-07T23:30:44.872ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206822025-03-07T23:30:44.872ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206832025-03-07T23:30:44.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206842025-03-07T23:30:44.876ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206852025-03-07T23:30:44.876ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206862025-03-07T23:30:44.877ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
206872025-03-07T23:30:44.877ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
206882025-03-07T23:30:44.878ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206892025-03-07T23:30:44.878ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206902025-03-07T23:30:44.878ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206912025-03-07T23:30:44.880ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
206922025-03-07T23:30:44.880ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206932025-03-07T23:30:44.881ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206942025-03-07T23:30:44.881ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
206952025-03-07T23:30:44.887ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
206962025-03-07T23:30:44.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
206972025-03-07T23:30:44.887ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
206982025-03-07T23:30:44.887ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
206992025-03-07T23:30:44.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207002025-03-07T23:30:44.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
207012025-03-07T23:30:44.892ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
207022025-03-07T23:30:44.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207032025-03-07T23:30:44.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207042025-03-07T23:30:44.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207052025-03-07T23:30:44.892ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
207062025-03-07T23:30:44.892ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207072025-03-07T23:30:44.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207082025-03-07T23:30:44.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207092025-03-07T23:30:44.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
207102025-03-07T23:30:44.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
207112025-03-07T23:30:44.897ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc uri = /v1/projects
207122025-03-07T23:30:44.897ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
207132025-03-07T23:30:44.897ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
207142025-03-07T23:30:44.897ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource = Database uri = /v1/projects
207152025-03-07T23:30:44.897ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc roles = RoleSet { roles: {} } uri = /v1/projects
207162025-03-07T23:30:44.897ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource = Database result = Ok(()) uri = /v1/projects
207172025-03-07T23:30:44.901ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
207182025-03-07T23:30:44.901ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource = Database uri = /v1/projects
207192025-03-07T23:30:44.901ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc roles = RoleSet { roles: {} } uri = /v1/projects
207202025-03-07T23:30:44.901ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource = Database result = Ok(()) uri = /v1/projects
207212025-03-07T23:30:44.904ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc roles = RoleSet { roles: {} } uri = /v1/projects
207222025-03-07T23:30:44.914ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Err(Forbidden) uri = /v1/projects
207232025-03-07T23:30:44.914ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Forbidden error_message_internal = Forbidden latency_us = 45092 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58c46225-c7a2-42d9-bee7-167dccdb88fc response_code = 403 uri = /v1/projects
207242025-03-07T23:30:44.914ZINFOtest_unauthorized (external client test context): client received response status = 403
207252025-03-07T23:30:44.914ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/projects
207262025-03-07T23:30:44.914ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects
207272025-03-07T23:30:44.915ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c579014a-b143-4510-b930-83dd8cbeb1f9 uri = /v1/projects
207282025-03-07T23:30:44.915ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c579014a-b143-4510-b930-83dd8cbeb1f9 uri = /v1/projects
207292025-03-07T23:30:44.915ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c579014a-b143-4510-b930-83dd8cbeb1f9 uri = /v1/projects
207302025-03-07T23:30:44.915ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c579014a-b143-4510-b930-83dd8cbeb1f9 uri = /v1/projects
207312025-03-07T23:30:44.915ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = creating a Project: Actor required latency_us = 405 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c579014a-b143-4510-b930-83dd8cbeb1f9 response_code = 401 uri = /v1/projects
207322025-03-07T23:30:44.915ZINFOtest_unauthorized (external client test context): client received response status = 401
207332025-03-07T23:30:44.915ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/projects
207342025-03-07T23:30:44.915ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects
207352025-03-07T23:30:44.916ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 36594de1-92a6-4866-bea6-ae00a7493048 uri = /v1/projects
207362025-03-07T23:30:44.917ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 36594de1-92a6-4866-bea6-ae00a7493048 uri = /v1/projects
207372025-03-07T23:30:44.917ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 36594de1-92a6-4866-bea6-ae00a7493048 uri = /v1/projects
207382025-03-07T23:30:44.917ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 276 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 36594de1-92a6-4866-bea6-ae00a7493048 response_code = 401 uri = /v1/projects
207392025-03-07T23:30:44.917ZINFOtest_unauthorized (external client test context): client received response status = 401
207402025-03-07T23:30:44.917ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/projects
207412025-03-07T23:30:44.917ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects
207422025-03-07T23:30:44.917ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0224051d-5c8f-4b27-8924-83d66ca1ec9f uri = /v1/projects
207432025-03-07T23:30:44.917ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0224051d-5c8f-4b27-8924-83d66ca1ec9f uri = /v1/projects
207442025-03-07T23:30:44.918ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:865:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Project>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:874:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Project>, dropshot::error::HttpError, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_create::{async_fn_env#0}, (dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Project>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0224051d-5c8f-4b27-8924-83d66ca1ec9f uri = /v1/projects
207452025-03-07T23:30:44.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1224 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0224051d-5c8f-4b27-8924-83d66ca1ec9f response_code = 401 uri = /v1/projects
207462025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client received response status = 401
207472025-03-07T23:30:44.919ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/projects
207482025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects
207492025-03-07T23:30:44.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58203cad-20ff-41ba-949c-363e88f2529a uri = /v1/projects
207502025-03-07T23:30:44.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58203cad-20ff-41ba-949c-363e88f2529a response_code = 405 uri = /v1/projects
207512025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client received response status = 405
207522025-03-07T23:30:44.919ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/projects
207532025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects
207542025-03-07T23:30:44.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dd16400b-6f37-4bb9-b5c5-c2535a066bd7 uri = /v1/projects
207552025-03-07T23:30:44.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 36 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dd16400b-6f37-4bb9-b5c5-c2535a066bd7 response_code = 405 uri = /v1/projects
207562025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client received response status = 405
207572025-03-07T23:30:44.919ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/projects
207582025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects
207592025-03-07T23:30:44.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9b6e43c4-d34c-4ba2-8b1d-c6102047bcf6 uri = /v1/projects
207602025-03-07T23:30:44.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 35 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9b6e43c4-d34c-4ba2-8b1d-c6102047bcf6 response_code = 405 uri = /v1/projects
207612025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client received response status = 405
207622025-03-07T23:30:44.919ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/projects
207632025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects
207642025-03-07T23:30:44.919ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 843e9837-bbd5-4637-b54d-6fc1da0d0b7a uri = /v1/projects
207652025-03-07T23:30:44.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 843e9837-bbd5-4637-b54d-6fc1da0d0b7a response_code = 405 uri = /v1/projects
207662025-03-07T23:30:44.919ZINFOtest_unauthorized (external client test context): client received response status = 405
207672025-03-07T23:30:44.920ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/projects
207682025-03-07T23:30:44.920ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects
207692025-03-07T23:30:44.920ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = be05fcf8-c3ae-4e8a-8adb-41d2410c310c uri = /v1/projects
207702025-03-07T23:30:44.920ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = be05fcf8-c3ae-4e8a-8adb-41d2410c310c response_code = 405 uri = /v1/projects
207712025-03-07T23:30:44.920ZINFOtest_unauthorized (external client test context): client received response status = 405
207722025-03-07T23:30:44.920ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/projects
207732025-03-07T23:30:44.920ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects
207742025-03-07T23:30:44.920ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b1fa19e6-9b48-4d1a-8266-ab1b2d3f3a9f uri = /v1/projects
207752025-03-07T23:30:44.920ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b1fa19e6-9b48-4d1a-8266-ab1b2d3f3a9f response_code = 405 uri = /v1/projects
207762025-03-07T23:30:44.920ZINFOtest_unauthorized (external client test context): client received response status = 405
207772025-03-07T23:30:44.920ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/projects
207782025-03-07T23:30:44.920ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects
207792025-03-07T23:30:44.921ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 16f69763-4551-45d8-a01e-b02dcef7a45a uri = /v1/projects
207802025-03-07T23:30:44.921ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 16f69763-4551-45d8-a01e-b02dcef7a45a response_code = 405 uri = /v1/projects
207812025-03-07T23:30:44.921ZINFOtest_unauthorized (external client test context): client received response status = 405
207822025-03-07T23:30:44.921ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/projects
207832025-03-07T23:30:44.921ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects
207842025-03-07T23:30:44.921ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = aa235210-577b-4f5f-bed9-0fb57ec5042b uri = /v1/projects
207852025-03-07T23:30:44.921ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = aa235210-577b-4f5f-bed9-0fb57ec5042b response_code = 405 uri = /v1/projects
207862025-03-07T23:30:44.921ZINFOtest_unauthorized (external client test context): client received response status = 405
207872025-03-07T23:30:44.921ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/projects
207882025-03-07T23:30:44.921ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects
207892025-03-07T23:30:44.922ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 uri = /v1/projects
207902025-03-07T23:30:44.922ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 uri = /v1/projects
207912025-03-07T23:30:44.922ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
207922025-03-07T23:30:44.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207932025-03-07T23:30:44.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207942025-03-07T23:30:44.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207952025-03-07T23:30:44.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
207962025-03-07T23:30:44.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
207972025-03-07T23:30:44.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
207982025-03-07T23:30:44.928ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
207992025-03-07T23:30:44.929ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
208002025-03-07T23:30:44.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208012025-03-07T23:30:44.929ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208022025-03-07T23:30:44.929ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208032025-03-07T23:30:44.930ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
208042025-03-07T23:30:44.931ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208052025-03-07T23:30:44.931ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208062025-03-07T23:30:44.931ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208072025-03-07T23:30:44.933ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
208082025-03-07T23:30:44.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
208092025-03-07T23:30:44.937ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208102025-03-07T23:30:44.937ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208112025-03-07T23:30:44.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208122025-03-07T23:30:44.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
208132025-03-07T23:30:44.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
208142025-03-07T23:30:44.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208152025-03-07T23:30:44.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208162025-03-07T23:30:44.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208172025-03-07T23:30:44.947ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
208182025-03-07T23:30:44.947ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208192025-03-07T23:30:44.947ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208202025-03-07T23:30:44.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208212025-03-07T23:30:44.949ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
208222025-03-07T23:30:44.952ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
208232025-03-07T23:30:44.952ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 uri = /v1/projects
208242025-03-07T23:30:44.952ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
208252025-03-07T23:30:44.953ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
208262025-03-07T23:30:44.953ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Database uri = /v1/projects
208272025-03-07T23:30:44.953ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 roles = RoleSet { roles: {} } uri = /v1/projects
208282025-03-07T23:30:44.953ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Database result = Ok(()) uri = /v1/projects
208292025-03-07T23:30:44.956ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
208302025-03-07T23:30:44.956ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Database uri = /v1/projects
208312025-03-07T23:30:44.956ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 roles = RoleSet { roles: {} } uri = /v1/projects
208322025-03-07T23:30:44.956ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Database result = Ok(()) uri = /v1/projects
208332025-03-07T23:30:44.959ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
208342025-03-07T23:30:44.964ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
208352025-03-07T23:30:44.964ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Database uri = /v1/projects
208362025-03-07T23:30:44.964ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 roles = RoleSet { roles: {} } uri = /v1/projects
208372025-03-07T23:30:44.965ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 resource = Database result = Ok(()) uri = /v1/projects
208382025-03-07T23:30:44.967ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 45618 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab53ae7a-4fd8-4fea-9727-c779ea149f19 response_code = 200 uri = /v1/projects
208392025-03-07T23:30:44.968ZINFOtest_unauthorized (external client test context): client received response status = 200
208402025-03-07T23:30:44.968ZINFOtest_unauthorized: test: begin endpoint url = /v1/projects/demo-project
208412025-03-07T23:30:44.968ZINFOtest_unauthorized: test: privileged GET url = /v1/projects/demo-project
208422025-03-07T23:30:44.968ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project
208432025-03-07T23:30:44.968ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 uri = /v1/projects/demo-project
208442025-03-07T23:30:44.968ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 uri = /v1/projects/demo-project
208452025-03-07T23:30:44.968ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project
208462025-03-07T23:30:44.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208472025-03-07T23:30:44.968ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208482025-03-07T23:30:44.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208492025-03-07T23:30:44.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208502025-03-07T23:30:44.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208512025-03-07T23:30:44.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208522025-03-07T23:30:44.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
208532025-03-07T23:30:44.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
208542025-03-07T23:30:44.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208552025-03-07T23:30:44.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208562025-03-07T23:30:44.973ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208572025-03-07T23:30:44.975ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
208582025-03-07T23:30:44.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208592025-03-07T23:30:44.975ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208602025-03-07T23:30:44.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208612025-03-07T23:30:44.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
208622025-03-07T23:30:44.981ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
208632025-03-07T23:30:44.981ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208642025-03-07T23:30:44.981ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208652025-03-07T23:30:44.981ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208662025-03-07T23:30:44.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
208672025-03-07T23:30:44.984ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
208682025-03-07T23:30:44.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208692025-03-07T23:30:44.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208702025-03-07T23:30:44.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208712025-03-07T23:30:44.986ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
208722025-03-07T23:30:44.986ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
208732025-03-07T23:30:44.986ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
208742025-03-07T23:30:44.987ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
208752025-03-07T23:30:44.988ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
208762025-03-07T23:30:44.991ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
208772025-03-07T23:30:44.992ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 uri = /v1/projects/demo-project
208782025-03-07T23:30:44.992ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database uri = /v1/projects/demo-project
208792025-03-07T23:30:44.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208802025-03-07T23:30:44.992ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database result = Ok(()) uri = /v1/projects/demo-project
208812025-03-07T23:30:44.994ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database uri = /v1/projects/demo-project
208822025-03-07T23:30:44.994ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208832025-03-07T23:30:44.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database result = Ok(()) uri = /v1/projects/demo-project
208842025-03-07T23:30:44.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
208852025-03-07T23:30:44.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project
208862025-03-07T23:30:44.996ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database uri = /v1/projects/demo-project
208872025-03-07T23:30:44.996ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208882025-03-07T23:30:44.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database result = Ok(()) uri = /v1/projects/demo-project
208892025-03-07T23:30:44.999ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
208902025-03-07T23:30:44.999ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database uri = /v1/projects/demo-project
208912025-03-07T23:30:44.999ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208922025-03-07T23:30:45.001ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database result = Ok(()) uri = /v1/projects/demo-project
208932025-03-07T23:30:45.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
208942025-03-07T23:30:45.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database uri = /v1/projects/demo-project
208952025-03-07T23:30:45.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
208962025-03-07T23:30:45.005ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Database result = Ok(()) uri = /v1/projects/demo-project
208972025-03-07T23:30:45.008ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project
208982025-03-07T23:30:45.015ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project
208992025-03-07T23:30:45.016ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 47923 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9932ede-7d28-4c95-9b41-1753a54c1c54 response_code = 200 uri = /v1/projects/demo-project
209002025-03-07T23:30:45.016ZINFOtest_unauthorized (external client test context): client received response status = 200
209012025-03-07T23:30:45.016ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/projects/demo-project
209022025-03-07T23:30:45.017ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project
209032025-03-07T23:30:45.017ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 uri = /v1/projects/demo-project
209042025-03-07T23:30:45.017ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 uri = /v1/projects/demo-project
209052025-03-07T23:30:45.017ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project
209062025-03-07T23:30:45.017ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209072025-03-07T23:30:45.017ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209082025-03-07T23:30:45.018ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209092025-03-07T23:30:45.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209102025-03-07T23:30:45.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209112025-03-07T23:30:45.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209122025-03-07T23:30:45.022ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
209132025-03-07T23:30:45.023ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
209142025-03-07T23:30:45.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209152025-03-07T23:30:45.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209162025-03-07T23:30:45.023ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209172025-03-07T23:30:45.025ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
209182025-03-07T23:30:45.025ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209192025-03-07T23:30:45.025ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209202025-03-07T23:30:45.026ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209212025-03-07T23:30:45.032ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
209222025-03-07T23:30:45.040ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
209232025-03-07T23:30:45.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209242025-03-07T23:30:45.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209252025-03-07T23:30:45.041ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209262025-03-07T23:30:45.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
209272025-03-07T23:30:45.044ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
209282025-03-07T23:30:45.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209292025-03-07T23:30:45.044ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209302025-03-07T23:30:45.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209312025-03-07T23:30:45.047ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
209322025-03-07T23:30:45.047ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209332025-03-07T23:30:45.047ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209342025-03-07T23:30:45.048ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209352025-03-07T23:30:45.057ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
209362025-03-07T23:30:45.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
209372025-03-07T23:30:45.063ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 uri = /v1/projects/demo-project
209382025-03-07T23:30:45.063ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database uri = /v1/projects/demo-project
209392025-03-07T23:30:45.063ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209402025-03-07T23:30:45.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database result = Ok(()) uri = /v1/projects/demo-project
209412025-03-07T23:30:45.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database uri = /v1/projects/demo-project
209422025-03-07T23:30:45.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209432025-03-07T23:30:45.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database result = Ok(()) uri = /v1/projects/demo-project
209442025-03-07T23:30:45.069ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
209452025-03-07T23:30:45.069ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project
209462025-03-07T23:30:45.069ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database uri = /v1/projects/demo-project
209472025-03-07T23:30:45.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209482025-03-07T23:30:45.070ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database result = Ok(()) uri = /v1/projects/demo-project
209492025-03-07T23:30:45.072ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
209502025-03-07T23:30:45.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database uri = /v1/projects/demo-project
209512025-03-07T23:30:45.073ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209522025-03-07T23:30:45.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database result = Ok(()) uri = /v1/projects/demo-project
209532025-03-07T23:30:45.084ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
209542025-03-07T23:30:45.084ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database uri = /v1/projects/demo-project
209552025-03-07T23:30:45.084ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209562025-03-07T23:30:45.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Database result = Ok(()) uri = /v1/projects/demo-project
209572025-03-07T23:30:45.095ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
209582025-03-07T23:30:45.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project
209592025-03-07T23:30:45.105ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 88695 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dca9c9c4-163d-47fc-876e-319e2e89aaf0 response_code = 404 uri = /v1/projects/demo-project
209602025-03-07T23:30:45.106ZINFOtest_unauthorized (external client test context): client received response status = 404
209612025-03-07T23:30:45.106ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/projects/demo-project
209622025-03-07T23:30:45.106ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project
209632025-03-07T23:30:45.106ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1229b66b-63e7-43cc-a60e-1fe9e1f35c27 uri = /v1/projects/demo-project
209642025-03-07T23:30:45.106ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1229b66b-63e7-43cc-a60e-1fe9e1f35c27 uri = /v1/projects/demo-project
209652025-03-07T23:30:45.107ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1229b66b-63e7-43cc-a60e-1fe9e1f35c27 uri = /v1/projects/demo-project
209662025-03-07T23:30:45.107ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1229b66b-63e7-43cc-a60e-1fe9e1f35c27 uri = /v1/projects/demo-project
209672025-03-07T23:30:45.107ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 281 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1229b66b-63e7-43cc-a60e-1fe9e1f35c27 response_code = 401 uri = /v1/projects/demo-project
209682025-03-07T23:30:45.107ZINFOtest_unauthorized (external client test context): client received response status = 401
209692025-03-07T23:30:45.107ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/projects/demo-project
209702025-03-07T23:30:45.107ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project
209712025-03-07T23:30:45.107ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3633f4e7-ffa6-40df-a3d1-dc16ab606fed uri = /v1/projects/demo-project
209722025-03-07T23:30:45.107ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3633f4e7-ffa6-40df-a3d1-dc16ab606fed uri = /v1/projects/demo-project
209732025-03-07T23:30:45.107ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3633f4e7-ffa6-40df-a3d1-dc16ab606fed uri = /v1/projects/demo-project
209742025-03-07T23:30:45.107ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 189 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3633f4e7-ffa6-40df-a3d1-dc16ab606fed response_code = 401 uri = /v1/projects/demo-project
209752025-03-07T23:30:45.107ZINFOtest_unauthorized (external client test context): client received response status = 401
209762025-03-07T23:30:45.108ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/projects/demo-project
209772025-03-07T23:30:45.108ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project
209782025-03-07T23:30:45.108ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18c973c8-745c-4d48-bc95-56ff23300ead uri = /v1/projects/demo-project
209792025-03-07T23:30:45.108ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18c973c8-745c-4d48-bc95-56ff23300ead uri = /v1/projects/demo-project
209802025-03-07T23:30:45.109ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:886:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:897:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18c973c8-745c-4d48-bc95-56ff23300ead uri = /v1/projects/demo-project
209812025-03-07T23:30:45.109ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1024 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18c973c8-745c-4d48-bc95-56ff23300ead response_code = 401 uri = /v1/projects/demo-project
209822025-03-07T23:30:45.109ZINFOtest_unauthorized (external client test context): client received response status = 401
209832025-03-07T23:30:45.109ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/projects/demo-project
209842025-03-07T23:30:45.109ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project
209852025-03-07T23:30:45.109ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb uri = /v1/projects/demo-project
209862025-03-07T23:30:45.110ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb uri = /v1/projects/demo-project
209872025-03-07T23:30:45.110ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project
209882025-03-07T23:30:45.110ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209892025-03-07T23:30:45.110ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209902025-03-07T23:30:45.110ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209912025-03-07T23:30:45.112ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209922025-03-07T23:30:45.112ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209932025-03-07T23:30:45.113ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209942025-03-07T23:30:45.115ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
209952025-03-07T23:30:45.115ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
209962025-03-07T23:30:45.115ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
209972025-03-07T23:30:45.115ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
209982025-03-07T23:30:45.116ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
209992025-03-07T23:30:45.117ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
210002025-03-07T23:30:45.119ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210012025-03-07T23:30:45.119ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210022025-03-07T23:30:45.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210032025-03-07T23:30:45.237ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
210042025-03-07T23:30:45.238ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
210052025-03-07T23:30:45.238ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
210062025-03-07T23:30:45.239ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
210072025-03-07T23:30:45.239ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
210082025-03-07T23:30:45.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
210092025-03-07T23:30:45.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210102025-03-07T23:30:45.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210112025-03-07T23:30:45.245ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210122025-03-07T23:30:45.250ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
210132025-03-07T23:30:45.250ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
210142025-03-07T23:30:45.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
210152025-03-07T23:30:45.250ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
210162025-03-07T23:30:45.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210172025-03-07T23:30:45.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210182025-03-07T23:30:45.251ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210192025-03-07T23:30:45.253ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
210202025-03-07T23:30:45.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
210212025-03-07T23:30:45.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
210222025-03-07T23:30:45.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
210232025-03-07T23:30:45.254ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
210242025-03-07T23:30:45.254ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
210252025-03-07T23:30:45.259ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
210262025-03-07T23:30:45.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
210272025-03-07T23:30:45.263ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb uri = /v1/projects/demo-project
210282025-03-07T23:30:45.263ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database uri = /v1/projects/demo-project
210292025-03-07T23:30:45.263ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210302025-03-07T23:30:45.263ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database result = Ok(()) uri = /v1/projects/demo-project
210312025-03-07T23:30:45.267ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database uri = /v1/projects/demo-project
210322025-03-07T23:30:45.267ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210332025-03-07T23:30:45.268ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database result = Ok(()) uri = /v1/projects/demo-project
210342025-03-07T23:30:45.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
210352025-03-07T23:30:45.279ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project
210362025-03-07T23:30:45.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database uri = /v1/projects/demo-project
210372025-03-07T23:30:45.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210382025-03-07T23:30:45.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database result = Ok(()) uri = /v1/projects/demo-project
210392025-03-07T23:30:45.293ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
210402025-03-07T23:30:45.293ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database uri = /v1/projects/demo-project
210412025-03-07T23:30:45.293ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210422025-03-07T23:30:45.296ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database result = Ok(()) uri = /v1/projects/demo-project
210432025-03-07T23:30:45.306ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
210442025-03-07T23:30:45.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database uri = /v1/projects/demo-project
210452025-03-07T23:30:45.306ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210462025-03-07T23:30:45.306ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Database result = Ok(()) uri = /v1/projects/demo-project
210472025-03-07T23:30:45.313ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
210482025-03-07T23:30:45.335ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project
210492025-03-07T23:30:45.335ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 225656 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = effa3f9c-82c5-416f-8217-e5f4ad93f3bb response_code = 404 uri = /v1/projects/demo-project
210502025-03-07T23:30:45.336ZINFOtest_unauthorized (external client test context): client received response status = 404
210512025-03-07T23:30:45.336ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/projects/demo-project
210522025-03-07T23:30:45.336ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project
210532025-03-07T23:30:45.336ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9c9c3ba0-aed6-4a23-bf12-55265295ead3 uri = /v1/projects/demo-project
210542025-03-07T23:30:45.336ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9c9c3ba0-aed6-4a23-bf12-55265295ead3 uri = /v1/projects/demo-project
210552025-03-07T23:30:45.336ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9c9c3ba0-aed6-4a23-bf12-55265295ead3 uri = /v1/projects/demo-project
210562025-03-07T23:30:45.336ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9c9c3ba0-aed6-4a23-bf12-55265295ead3 uri = /v1/projects/demo-project
210572025-03-07T23:30:45.336ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 372 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9c9c3ba0-aed6-4a23-bf12-55265295ead3 response_code = 401 uri = /v1/projects/demo-project
210582025-03-07T23:30:45.337ZINFOtest_unauthorized (external client test context): client received response status = 401
210592025-03-07T23:30:45.337ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/projects/demo-project
210602025-03-07T23:30:45.337ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project
210612025-03-07T23:30:45.337ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f8e793ea-6db2-497f-8eb4-2950cc762784 uri = /v1/projects/demo-project
210622025-03-07T23:30:45.337ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f8e793ea-6db2-497f-8eb4-2950cc762784 uri = /v1/projects/demo-project
210632025-03-07T23:30:45.337ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f8e793ea-6db2-497f-8eb4-2950cc762784 uri = /v1/projects/demo-project
210642025-03-07T23:30:45.337ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 215 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f8e793ea-6db2-497f-8eb4-2950cc762784 response_code = 401 uri = /v1/projects/demo-project
210652025-03-07T23:30:45.337ZINFOtest_unauthorized (external client test context): client received response status = 401
210662025-03-07T23:30:45.338ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/projects/demo-project
210672025-03-07T23:30:45.338ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project
210682025-03-07T23:30:45.338ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2d173f5c-794b-46e3-a13d-dba41851cfdd uri = /v1/projects/demo-project
210692025-03-07T23:30:45.338ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2d173f5c-794b-46e3-a13d-dba41851cfdd uri = /v1/projects/demo-project
210702025-03-07T23:30:45.340ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:940:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:954:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ProjectUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Project>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2d173f5c-794b-46e3-a13d-dba41851cfdd uri = /v1/projects/demo-project
210712025-03-07T23:30:45.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1418 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2d173f5c-794b-46e3-a13d-dba41851cfdd response_code = 401 uri = /v1/projects/demo-project
210722025-03-07T23:30:45.340ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
210732025-03-07T23:30:45.340ZINFOtest_unauthorized (external client test context): client received response status = 401
210742025-03-07T23:30:45.340ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/projects/demo-project
210752025-03-07T23:30:45.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project
210762025-03-07T23:30:45.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ab9a3d8c-1a40-47ee-8629-0ea20dd76847 uri = /v1/projects/demo-project
210772025-03-07T23:30:45.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ab9a3d8c-1a40-47ee-8629-0ea20dd76847 response_code = 405 uri = /v1/projects/demo-project
210782025-03-07T23:30:45.340ZINFOtest_unauthorized (external client test context): client received response status = 405
210792025-03-07T23:30:45.340ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/projects/demo-project
210802025-03-07T23:30:45.340ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project
210812025-03-07T23:30:45.340ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61d9d94a-0fda-4d56-bfb8-b9a68848a146 uri = /v1/projects/demo-project
210822025-03-07T23:30:45.340ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 61d9d94a-0fda-4d56-bfb8-b9a68848a146 response_code = 405 uri = /v1/projects/demo-project
210832025-03-07T23:30:45.341ZINFOtest_unauthorized (external client test context): client received response status = 405
210842025-03-07T23:30:45.341ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/projects/demo-project
210852025-03-07T23:30:45.341ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project
210862025-03-07T23:30:45.341ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f01fcc1f-b3ac-4555-bce8-646334395a32 uri = /v1/projects/demo-project
210872025-03-07T23:30:45.341ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f01fcc1f-b3ac-4555-bce8-646334395a32 response_code = 405 uri = /v1/projects/demo-project
210882025-03-07T23:30:45.341ZINFOtest_unauthorized (external client test context): client received response status = 405
210892025-03-07T23:30:45.341ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/projects/demo-project
210902025-03-07T23:30:45.341ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project
210912025-03-07T23:30:45.341ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30b6c64d-64b8-4bf2-bdf3-136509c57aae uri = /v1/projects/demo-project
210922025-03-07T23:30:45.341ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30b6c64d-64b8-4bf2-bdf3-136509c57aae response_code = 405 uri = /v1/projects/demo-project
210932025-03-07T23:30:45.341ZINFOtest_unauthorized (external client test context): client received response status = 405
210942025-03-07T23:30:45.342ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/projects/demo-project
210952025-03-07T23:30:45.342ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project
210962025-03-07T23:30:45.342ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa uri = /v1/projects/demo-project
210972025-03-07T23:30:45.342ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa uri = /v1/projects/demo-project
210982025-03-07T23:30:45.342ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project
210992025-03-07T23:30:45.342ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211002025-03-07T23:30:45.342ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211012025-03-07T23:30:45.343ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211022025-03-07T23:30:45.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211032025-03-07T23:30:45.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211042025-03-07T23:30:45.348ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211052025-03-07T23:30:45.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
211062025-03-07T23:30:45.353ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
211072025-03-07T23:30:45.353ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211082025-03-07T23:30:45.353ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211092025-03-07T23:30:45.354ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211102025-03-07T23:30:45.357ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
211112025-03-07T23:30:45.357ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211122025-03-07T23:30:45.357ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211132025-03-07T23:30:45.358ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211142025-03-07T23:30:45.367ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
211152025-03-07T23:30:45.371ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
211162025-03-07T23:30:45.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211172025-03-07T23:30:45.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211182025-03-07T23:30:45.372ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211192025-03-07T23:30:45.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
211202025-03-07T23:30:45.382ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
211212025-03-07T23:30:45.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211222025-03-07T23:30:45.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211232025-03-07T23:30:45.383ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211242025-03-07T23:30:45.395ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
211252025-03-07T23:30:45.395ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
211262025-03-07T23:30:45.395ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
211272025-03-07T23:30:45.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
211282025-03-07T23:30:45.399ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
211292025-03-07T23:30:45.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
211302025-03-07T23:30:45.403ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa uri = /v1/projects/demo-project
211312025-03-07T23:30:45.403ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database uri = /v1/projects/demo-project
211322025-03-07T23:30:45.403ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211332025-03-07T23:30:45.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database result = Ok(()) uri = /v1/projects/demo-project
211342025-03-07T23:30:45.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database uri = /v1/projects/demo-project
211352025-03-07T23:30:45.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211362025-03-07T23:30:45.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database result = Ok(()) uri = /v1/projects/demo-project
211372025-03-07T23:30:45.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
211382025-03-07T23:30:45.411ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
211392025-03-07T23:30:45.411ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
211402025-03-07T23:30:45.411ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project
211412025-03-07T23:30:45.411ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database uri = /v1/projects/demo-project
211422025-03-07T23:30:45.411ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211432025-03-07T23:30:45.412ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database result = Ok(()) uri = /v1/projects/demo-project
211442025-03-07T23:30:45.413ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0a9267d2-9b23-4c38-947a-a030e173513b uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
211452025-03-07T23:30:45.413ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0a9267d2-9b23-4c38-947a-a030e173513b resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
211462025-03-07T23:30:45.413ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0a9267d2-9b23-4c38-947a-a030e173513b roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
211472025-03-07T23:30:45.413ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0a9267d2-9b23-4c38-947a-a030e173513b resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
211482025-03-07T23:30:45.418ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
211492025-03-07T23:30:45.419ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database uri = /v1/projects/demo-project
211502025-03-07T23:30:45.419ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211512025-03-07T23:30:45.419ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database result = Ok(()) uri = /v1/projects/demo-project
211522025-03-07T23:30:45.420ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7208 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0a9267d2-9b23-4c38-947a-a030e173513b response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
211532025-03-07T23:30:45.420ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a9267d2-9b23-4c38-947a-a030e173513b", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:45 GMT"} })
211542025-03-07T23:30:45.420ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
211552025-03-07T23:30:45.423ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 835e8b0f-68a4-4784-a6e0-81cf8fb08763 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
211562025-03-07T23:30:45.423ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 835e8b0f-68a4-4784-a6e0-81cf8fb08763 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
211572025-03-07T23:30:45.423ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 835e8b0f-68a4-4784-a6e0-81cf8fb08763 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
211582025-03-07T23:30:45.424ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 835e8b0f-68a4-4784-a6e0-81cf8fb08763 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
211592025-03-07T23:30:45.424ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
211602025-03-07T23:30:45.424ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database uri = /v1/projects/demo-project
211612025-03-07T23:30:45.424ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211622025-03-07T23:30:45.424ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Database result = Ok(()) uri = /v1/projects/demo-project
211632025-03-07T23:30:45.428ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5112 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 835e8b0f-68a4-4784-a6e0-81cf8fb08763 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
211642025-03-07T23:30:45.429ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "835e8b0f-68a4-4784-a6e0-81cf8fb08763", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:45 GMT"} })
211652025-03-07T23:30:45.429ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
211662025-03-07T23:30:45.429ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211672025-03-07T23:30:45.430ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
211682025-03-07T23:30:45.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
211692025-03-07T23:30:45.447ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project
211702025-03-07T23:30:45.448ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 105946 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 01a49392-0314-4a3b-8f74-4edb634dfafa response_code = 404 uri = /v1/projects/demo-project
211712025-03-07T23:30:45.449ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
211722025-03-07T23:30:45.449ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
211732025-03-07T23:30:45.450ZINFOtest_unauthorized (external client test context): client received response status = 404
211742025-03-07T23:30:45.450ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/projects/demo-project
211752025-03-07T23:30:45.450ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project
211762025-03-07T23:30:45.450ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 3dbebdba-9ab2-46b3-aadc-7d69ff7f5c0e uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
211772025-03-07T23:30:45.649ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 198398 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 3dbebdba-9ab2-46b3-aadc-7d69ff7f5c0e response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
211782025-03-07T23:30:45.649ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8507623-2c21-4a41-80e5-167637fdd532 uri = /v1/projects/demo-project
211792025-03-07T23:30:45.649ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211802025-03-07T23:30:45.649ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8507623-2c21-4a41-80e5-167637fdd532 uri = /v1/projects/demo-project
211812025-03-07T23:30:45.649ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8507623-2c21-4a41-80e5-167637fdd532 uri = /v1/projects/demo-project
211822025-03-07T23:30:45.649ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8507623-2c21-4a41-80e5-167637fdd532 uri = /v1/projects/demo-project
211832025-03-07T23:30:45.649ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
211842025-03-07T23:30:45.649ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211852025-03-07T23:30:45.661ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 785 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e8507623-2c21-4a41-80e5-167637fdd532 response_code = 401 uri = /v1/projects/demo-project
211862025-03-07T23:30:45.661ZINFOtest_unauthorized (external client test context): client received response status = 401
211872025-03-07T23:30:45.661ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/projects/demo-project
211882025-03-07T23:30:45.661ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project
211892025-03-07T23:30:45.661ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211902025-03-07T23:30:45.661ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211912025-03-07T23:30:45.661ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211922025-03-07T23:30:45.661ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
211932025-03-07T23:30:45.661ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 74e66a2d-5335-404b-80b5-3914c2ae3c41 uri = /v1/projects/demo-project
211942025-03-07T23:30:45.661ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 74e66a2d-5335-404b-80b5-3914c2ae3c41 uri = /v1/projects/demo-project
211952025-03-07T23:30:45.661ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 74e66a2d-5335-404b-80b5-3914c2ae3c41 uri = /v1/projects/demo-project
211962025-03-07T23:30:45.661ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 220 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 74e66a2d-5335-404b-80b5-3914c2ae3c41 response_code = 401 uri = /v1/projects/demo-project
211972025-03-07T23:30:45.661ZINFOtest_unauthorized (external client test context): client received response status = 401
211982025-03-07T23:30:45.661ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/projects/demo-project
211992025-03-07T23:30:45.661ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project
212002025-03-07T23:30:45.661ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a8146d19-70f0-40f8-815e-d082a9c25a24 uri = /v1/projects/demo-project
212012025-03-07T23:30:45.661ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a8146d19-70f0-40f8-815e-d082a9c25a24 uri = /v1/projects/demo-project
212022025-03-07T23:30:45.662ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:909:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:921:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a8146d19-70f0-40f8-815e-d082a9c25a24 uri = /v1/projects/demo-project
212032025-03-07T23:30:45.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1077 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a8146d19-70f0-40f8-815e-d082a9c25a24 response_code = 401 uri = /v1/projects/demo-project
212042025-03-07T23:30:45.662ZINFOtest_unauthorized (external client test context): client received response status = 401
212052025-03-07T23:30:45.662ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/projects/demo-project
212062025-03-07T23:30:45.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project
212072025-03-07T23:30:45.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 292f7c8d-3ccd-4f2c-8e70-92d425d02a46 uri = /v1/projects/demo-project
212082025-03-07T23:30:45.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 292f7c8d-3ccd-4f2c-8e70-92d425d02a46 response_code = 405 uri = /v1/projects/demo-project
212092025-03-07T23:30:45.662ZINFOtest_unauthorized (external client test context): client received response status = 405
212102025-03-07T23:30:45.662ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/projects/demo-project
212112025-03-07T23:30:45.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project
212122025-03-07T23:30:45.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 28dea153-2d94-4b71-be44-49dc09c3de6c uri = /v1/projects/demo-project
212132025-03-07T23:30:45.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 28dea153-2d94-4b71-be44-49dc09c3de6c response_code = 405 uri = /v1/projects/demo-project
212142025-03-07T23:30:45.902ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
212152025-03-07T23:30:45.902ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
212162025-03-07T23:30:45.902ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
212172025-03-07T23:30:45.906ZDEBGtest_unauthorized (results-sink): inserting 146 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
212182025-03-07T23:30:45.906ZDEBGtest_unauthorized (results-sink-cluster): inserting 146 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
212192025-03-07T23:30:45.906ZDEBGtest_unauthorized (clickhouse-client): unrolling 146 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
212202025-03-07T23:30:46.100ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
212212025-03-07T23:30:46.101ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
212222025-03-07T23:30:46.101ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
212232025-03-07T23:30:46.101ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
212242025-03-07T23:30:46.101ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
212252025-03-07T23:30:46.101ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
212262025-03-07T23:30:46.101ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
212272025-03-07T23:30:46.102ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
212282025-03-07T23:30:46.102ZINFOtest_unauthorized (external client test context): client received response status = 405
212292025-03-07T23:30:46.102ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/projects/demo-project
212302025-03-07T23:30:46.102ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project
212312025-03-07T23:30:46.104ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fbd6758f-8ef5-4935-bd1e-bee8c852eec9 uri = /v1/projects/demo-project
212322025-03-07T23:30:46.104ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 99 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fbd6758f-8ef5-4935-bd1e-bee8c852eec9 response_code = 405 uri = /v1/projects/demo-project
212332025-03-07T23:30:46.106ZINFOtest_unauthorized (external client test context): client received response status = 405
212342025-03-07T23:30:46.106ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/projects/demo-project
212352025-03-07T23:30:46.106ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project
212362025-03-07T23:30:46.115ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = fields_ipaddr
212372025-03-07T23:30:46.115ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 292 sql = INSERT INTO oximeter.fields_string FORMAT Native
212382025-03-07T23:30:46.117ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2800b169-1f25-490c-847f-3354b2fcf50f uri = /v1/projects/demo-project
212392025-03-07T23:30:46.117ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 227 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2800b169-1f25-490c-847f-3354b2fcf50f response_code = 405 uri = /v1/projects/demo-project
212402025-03-07T23:30:46.126ZINFOtest_unauthorized (external client test context): client received response status = 405
212412025-03-07T23:30:46.126ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/projects/demo-project
212422025-03-07T23:30:46.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project
212432025-03-07T23:30:46.127ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 292 table_name = fields_string
212442025-03-07T23:30:46.127ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 145 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
212452025-03-07T23:30:46.129ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 uri = /v1/projects/demo-project
212462025-03-07T23:30:46.132ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 uri = /v1/projects/demo-project
212472025-03-07T23:30:46.132ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project
212482025-03-07T23:30:46.132ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212492025-03-07T23:30:46.132ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212502025-03-07T23:30:46.133ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212512025-03-07T23:30:46.134ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 145 table_name = fields_u16
212522025-03-07T23:30:46.134ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 151 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
212532025-03-07T23:30:46.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212542025-03-07T23:30:46.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212552025-03-07T23:30:46.146ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212562025-03-07T23:30:46.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
212572025-03-07T23:30:46.151ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
212582025-03-07T23:30:46.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212592025-03-07T23:30:46.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212602025-03-07T23:30:46.152ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212612025-03-07T23:30:46.153ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 151 table_name = fields_uuid
212622025-03-07T23:30:46.153ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
212632025-03-07T23:30:46.155ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
212642025-03-07T23:30:46.155ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212652025-03-07T23:30:46.155ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212662025-03-07T23:30:46.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212672025-03-07T23:30:46.157ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
212682025-03-07T23:30:46.159ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
212692025-03-07T23:30:46.163ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
212702025-03-07T23:30:46.183ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212712025-03-07T23:30:46.183ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212722025-03-07T23:30:46.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212732025-03-07T23:30:46.192ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_cumulativeu64
212742025-03-07T23:30:46.192ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 144 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
212752025-03-07T23:30:46.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
212762025-03-07T23:30:46.194ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
212772025-03-07T23:30:46.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212782025-03-07T23:30:46.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212792025-03-07T23:30:46.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212802025-03-07T23:30:46.210ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 144 table_name = measurements_histogramu64
212812025-03-07T23:30:46.210ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
212822025-03-07T23:30:46.211ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
212832025-03-07T23:30:46.211ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
212842025-03-07T23:30:46.211ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
212852025-03-07T23:30:46.212ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
212862025-03-07T23:30:46.217ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
212872025-03-07T23:30:46.217ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
212882025-03-07T23:30:46.218ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
212892025-03-07T23:30:46.218ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
212902025-03-07T23:30:46.223ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
212912025-03-07T23:30:46.223ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 uri = /v1/projects/demo-project
212922025-03-07T23:30:46.223ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database uri = /v1/projects/demo-project
212932025-03-07T23:30:46.223ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
212942025-03-07T23:30:46.224ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database result = Ok(()) uri = /v1/projects/demo-project
212952025-03-07T23:30:46.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database uri = /v1/projects/demo-project
212962025-03-07T23:30:46.231ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
212972025-03-07T23:30:46.232ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database result = Ok(()) uri = /v1/projects/demo-project
212982025-03-07T23:30:46.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project
212992025-03-07T23:30:46.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project
213002025-03-07T23:30:46.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database uri = /v1/projects/demo-project
213012025-03-07T23:30:46.237ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
213022025-03-07T23:30:46.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database result = Ok(()) uri = /v1/projects/demo-project
213032025-03-07T23:30:46.245ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project
213042025-03-07T23:30:46.245ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database uri = /v1/projects/demo-project
213052025-03-07T23:30:46.246ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
213062025-03-07T23:30:46.256ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database result = Ok(()) uri = /v1/projects/demo-project
213072025-03-07T23:30:46.279ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project
213082025-03-07T23:30:46.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database uri = /v1/projects/demo-project
213092025-03-07T23:30:46.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project
213102025-03-07T23:30:46.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Database result = Ok(()) uri = /v1/projects/demo-project
213112025-03-07T23:30:46.318ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project
213122025-03-07T23:30:46.325ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project
213132025-03-07T23:30:46.325ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 196406 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3fceed02-3213-4313-8fe8-cd60eed694d6 response_code = 200 uri = /v1/projects/demo-project
213142025-03-07T23:30:46.326ZINFOtest_unauthorized (external client test context): client received response status = 200
213152025-03-07T23:30:46.326ZINFOtest_unauthorized: test: begin endpoint url = /v1/projects/demo-project/policy
213162025-03-07T23:30:46.326ZINFOtest_unauthorized: test: privileged GET url = /v1/projects/demo-project/policy
213172025-03-07T23:30:46.326ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
213182025-03-07T23:30:46.326ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 uri = /v1/projects/demo-project/policy
213192025-03-07T23:30:46.333ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 uri = /v1/projects/demo-project/policy
213202025-03-07T23:30:46.334ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project/policy
213212025-03-07T23:30:46.334ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213222025-03-07T23:30:46.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213232025-03-07T23:30:46.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213242025-03-07T23:30:46.427ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213252025-03-07T23:30:46.427ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213262025-03-07T23:30:46.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213272025-03-07T23:30:46.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
213282025-03-07T23:30:46.436ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
213292025-03-07T23:30:46.436ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213302025-03-07T23:30:46.436ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213312025-03-07T23:30:46.437ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213322025-03-07T23:30:46.459ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
213332025-03-07T23:30:46.459ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213342025-03-07T23:30:46.459ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213352025-03-07T23:30:46.460ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213362025-03-07T23:30:46.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
213372025-03-07T23:30:46.470ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
213382025-03-07T23:30:46.470ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213392025-03-07T23:30:46.471ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213402025-03-07T23:30:46.474ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213412025-03-07T23:30:46.478ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
213422025-03-07T23:30:46.478ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
213432025-03-07T23:30:46.479ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213442025-03-07T23:30:46.479ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213452025-03-07T23:30:46.481ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213462025-03-07T23:30:46.498ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
213472025-03-07T23:30:46.498ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
213482025-03-07T23:30:46.498ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
213492025-03-07T23:30:46.499ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
213502025-03-07T23:30:46.527ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
213512025-03-07T23:30:46.532ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
213522025-03-07T23:30:46.532ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 uri = /v1/projects/demo-project/policy
213532025-03-07T23:30:46.532ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213542025-03-07T23:30:46.532ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213552025-03-07T23:30:46.533ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213562025-03-07T23:30:46.538ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213572025-03-07T23:30:46.538ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213582025-03-07T23:30:46.539ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213592025-03-07T23:30:46.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
213602025-03-07T23:30:46.549ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project/policy
213612025-03-07T23:30:46.549ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213622025-03-07T23:30:46.550ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213632025-03-07T23:30:46.552ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213642025-03-07T23:30:46.560ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
213652025-03-07T23:30:46.562ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213662025-03-07T23:30:46.562ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213672025-03-07T23:30:46.584ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213682025-03-07T23:30:46.585ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
213692025-03-07T23:30:46.585ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
213702025-03-07T23:30:46.587ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
213712025-03-07T23:30:46.588ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
213722025-03-07T23:30:46.588ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
213732025-03-07T23:30:46.588ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
213742025-03-07T23:30:46.588ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
213752025-03-07T23:30:46.588ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213762025-03-07T23:30:46.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213772025-03-07T23:30:46.589ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213782025-03-07T23:30:46.601ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
213792025-03-07T23:30:46.631ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
213802025-03-07T23:30:46.633ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213812025-03-07T23:30:46.633ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213822025-03-07T23:30:46.633ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213832025-03-07T23:30:46.634ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
213842025-03-07T23:30:46.634ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project/policy
213852025-03-07T23:30:46.635ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213862025-03-07T23:30:46.635ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213872025-03-07T23:30:46.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213882025-03-07T23:30:46.644ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
213892025-03-07T23:30:46.644ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213902025-03-07T23:30:46.644ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213912025-03-07T23:30:46.645ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213922025-03-07T23:30:46.654ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
213932025-03-07T23:30:46.660ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database uri = /v1/projects/demo-project/policy
213942025-03-07T23:30:46.661ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
213952025-03-07T23:30:46.661ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
213962025-03-07T23:30:46.683ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
213972025-03-07T23:30:46.696ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
213982025-03-07T23:30:46.697ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
213992025-03-07T23:30:46.698ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 371838 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c513250-4caf-4dae-b0c9-dab402c68ea5 response_code = 200 uri = /v1/projects/demo-project/policy
214002025-03-07T23:30:46.699ZINFOtest_unauthorized (external client test context): client received response status = 200
214012025-03-07T23:30:46.699ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/projects/demo-project/policy
214022025-03-07T23:30:46.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
214032025-03-07T23:30:46.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de uri = /v1/projects/demo-project/policy
214042025-03-07T23:30:46.700ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de uri = /v1/projects/demo-project/policy
214052025-03-07T23:30:46.700ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project/policy
214062025-03-07T23:30:46.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214072025-03-07T23:30:46.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214082025-03-07T23:30:46.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214092025-03-07T23:30:46.707ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214102025-03-07T23:30:46.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214112025-03-07T23:30:46.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214122025-03-07T23:30:46.746ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
214132025-03-07T23:30:46.747ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
214142025-03-07T23:30:46.747ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214152025-03-07T23:30:46.747ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214162025-03-07T23:30:46.748ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214172025-03-07T23:30:46.753ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
214182025-03-07T23:30:46.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214192025-03-07T23:30:46.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214202025-03-07T23:30:46.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214212025-03-07T23:30:46.759ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
214222025-03-07T23:30:46.763ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
214232025-03-07T23:30:46.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214242025-03-07T23:30:46.768ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214252025-03-07T23:30:46.769ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214262025-03-07T23:30:46.772ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
214272025-03-07T23:30:46.772ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
214282025-03-07T23:30:46.772ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214292025-03-07T23:30:46.772ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214302025-03-07T23:30:46.773ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214312025-03-07T23:30:46.784ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
214322025-03-07T23:30:46.809ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214332025-03-07T23:30:46.810ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214342025-03-07T23:30:46.811ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214352025-03-07T23:30:46.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
214362025-03-07T23:30:46.847ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
214372025-03-07T23:30:46.847ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de uri = /v1/projects/demo-project/policy
214382025-03-07T23:30:46.848ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database uri = /v1/projects/demo-project/policy
214392025-03-07T23:30:46.848ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214402025-03-07T23:30:46.848ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214412025-03-07T23:30:46.857ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database uri = /v1/projects/demo-project/policy
214422025-03-07T23:30:46.857ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214432025-03-07T23:30:46.858ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214442025-03-07T23:30:46.863ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
214452025-03-07T23:30:46.864ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project/policy
214462025-03-07T23:30:46.864ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database uri = /v1/projects/demo-project/policy
214472025-03-07T23:30:46.864ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214482025-03-07T23:30:46.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214492025-03-07T23:30:46.869ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
214502025-03-07T23:30:46.870ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database uri = /v1/projects/demo-project/policy
214512025-03-07T23:30:46.870ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214522025-03-07T23:30:46.870ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214532025-03-07T23:30:46.873ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
214542025-03-07T23:30:46.873ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database uri = /v1/projects/demo-project/policy
214552025-03-07T23:30:46.873ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214562025-03-07T23:30:46.874ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
214572025-03-07T23:30:46.878ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
214582025-03-07T23:30:46.945ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project/policy
214592025-03-07T23:30:46.945ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 245663 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 291a49a1-37e6-41d6-89bc-d9836a43a2de response_code = 404 uri = /v1/projects/demo-project/policy
214602025-03-07T23:30:46.946ZINFOtest_unauthorized (external client test context): client received response status = 404
214612025-03-07T23:30:46.947ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/projects/demo-project/policy
214622025-03-07T23:30:46.947ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
214632025-03-07T23:30:46.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b9a3b68-280f-48be-9394-23d66d4469f8 uri = /v1/projects/demo-project/policy
214642025-03-07T23:30:46.948ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b9a3b68-280f-48be-9394-23d66d4469f8 uri = /v1/projects/demo-project/policy
214652025-03-07T23:30:46.948ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b9a3b68-280f-48be-9394-23d66d4469f8 uri = /v1/projects/demo-project/policy
214662025-03-07T23:30:46.948ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b9a3b68-280f-48be-9394-23d66d4469f8 uri = /v1/projects/demo-project/policy
214672025-03-07T23:30:46.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1565 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b9a3b68-280f-48be-9394-23d66d4469f8 response_code = 401 uri = /v1/projects/demo-project/policy
214682025-03-07T23:30:46.951ZINFOtest_unauthorized (external client test context): client received response status = 401
214692025-03-07T23:30:46.951ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/projects/demo-project/policy
214702025-03-07T23:30:46.951ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
214712025-03-07T23:30:46.952ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d898ad4a-9fc1-4953-8805-8b41a20b7538 uri = /v1/projects/demo-project/policy
214722025-03-07T23:30:46.952ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d898ad4a-9fc1-4953-8805-8b41a20b7538 uri = /v1/projects/demo-project/policy
214732025-03-07T23:30:46.952ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d898ad4a-9fc1-4953-8805-8b41a20b7538 uri = /v1/projects/demo-project/policy
214742025-03-07T23:30:46.952ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 574 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d898ad4a-9fc1-4953-8805-8b41a20b7538 response_code = 401 uri = /v1/projects/demo-project/policy
214752025-03-07T23:30:46.953ZINFOtest_unauthorized (external client test context): client received response status = 401
214762025-03-07T23:30:46.953ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/projects/demo-project/policy
214772025-03-07T23:30:46.954ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
214782025-03-07T23:30:46.954ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad49b074-6429-4f7f-9c61-38854955cb81 uri = /v1/projects/demo-project/policy
214792025-03-07T23:30:46.954ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad49b074-6429-4f7f-9c61-38854955cb81 uri = /v1/projects/demo-project/policy
214802025-03-07T23:30:46.956ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:967:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:980:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad49b074-6429-4f7f-9c61-38854955cb81 uri = /v1/projects/demo-project/policy
214812025-03-07T23:30:46.957ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3363 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad49b074-6429-4f7f-9c61-38854955cb81 response_code = 401 uri = /v1/projects/demo-project/policy
214822025-03-07T23:30:46.958ZINFOtest_unauthorized (external client test context): client received response status = 401
214832025-03-07T23:30:46.959ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/projects/demo-project/policy
214842025-03-07T23:30:46.959ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
214852025-03-07T23:30:46.960ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 uri = /v1/projects/demo-project/policy
214862025-03-07T23:30:46.964ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 uri = /v1/projects/demo-project/policy
214872025-03-07T23:30:46.964ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/projects/demo-project/policy
214882025-03-07T23:30:46.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214892025-03-07T23:30:46.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214902025-03-07T23:30:46.967ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214912025-03-07T23:30:46.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214922025-03-07T23:30:46.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214932025-03-07T23:30:46.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214942025-03-07T23:30:46.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
214952025-03-07T23:30:46.990ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
214962025-03-07T23:30:46.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
214972025-03-07T23:30:46.991ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
214982025-03-07T23:30:46.991ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
214992025-03-07T23:30:46.999ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
215002025-03-07T23:30:46.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215012025-03-07T23:30:46.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215022025-03-07T23:30:47.001ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215032025-03-07T23:30:47.006ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
215042025-03-07T23:30:47.013ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
215052025-03-07T23:30:47.013ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215062025-03-07T23:30:47.013ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215072025-03-07T23:30:47.014ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215082025-03-07T23:30:47.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
215092025-03-07T23:30:47.021ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
215102025-03-07T23:30:47.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215112025-03-07T23:30:47.021ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215122025-03-07T23:30:47.032ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215132025-03-07T23:30:47.036ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
215142025-03-07T23:30:47.036ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
215152025-03-07T23:30:47.036ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
215162025-03-07T23:30:47.038ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
215172025-03-07T23:30:47.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
215182025-03-07T23:30:47.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
215192025-03-07T23:30:47.059ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 uri = /v1/projects/demo-project/policy
215202025-03-07T23:30:47.059ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database uri = /v1/projects/demo-project/policy
215212025-03-07T23:30:47.059ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
215222025-03-07T23:30:47.060ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
215232025-03-07T23:30:47.065ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database uri = /v1/projects/demo-project/policy
215242025-03-07T23:30:47.088ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
215252025-03-07T23:30:47.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
215262025-03-07T23:30:47.113ZTRACtest_unauthorized (dropshot_external): authorize begin action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
215272025-03-07T23:30:47.113ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project/policy
215282025-03-07T23:30:47.113ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database uri = /v1/projects/demo-project/policy
215292025-03-07T23:30:47.113ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
215302025-03-07T23:30:47.114ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
215312025-03-07T23:30:47.126ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
215322025-03-07T23:30:47.126ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database uri = /v1/projects/demo-project/policy
215332025-03-07T23:30:47.126ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
215342025-03-07T23:30:47.127ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
215352025-03-07T23:30:47.132ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
215362025-03-07T23:30:47.132ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database uri = /v1/projects/demo-project/policy
215372025-03-07T23:30:47.132ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
215382025-03-07T23:30:47.132ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
215392025-03-07T23:30:47.141ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
215402025-03-07T23:30:47.158ZDEBGtest_unauthorized (dropshot_external): authorize result action = ModifyPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/projects/demo-project/policy
215412025-03-07T23:30:47.158ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 198410 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a06498cc-a65f-4d45-8100-5ef4e2f549a3 response_code = 404 uri = /v1/projects/demo-project/policy
215422025-03-07T23:30:47.159ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
215432025-03-07T23:30:47.159ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
215442025-03-07T23:30:47.159ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
215452025-03-07T23:30:47.160ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
215462025-03-07T23:30:47.160ZINFOtest_unauthorized (external client test context): client received response status = 404
215472025-03-07T23:30:47.160ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/projects/demo-project/policy
215482025-03-07T23:30:47.160ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215492025-03-07T23:30:47.160ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8b1edc88-eeca-4049-bd78-4316ccd5a49f uri = /v1/projects/demo-project/policy
215502025-03-07T23:30:47.161ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8b1edc88-eeca-4049-bd78-4316ccd5a49f uri = /v1/projects/demo-project/policy
215512025-03-07T23:30:47.161ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8b1edc88-eeca-4049-bd78-4316ccd5a49f uri = /v1/projects/demo-project/policy
215522025-03-07T23:30:47.161ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8b1edc88-eeca-4049-bd78-4316ccd5a49f uri = /v1/projects/demo-project/policy
215532025-03-07T23:30:47.161ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 389 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8b1edc88-eeca-4049-bd78-4316ccd5a49f response_code = 401 uri = /v1/projects/demo-project/policy
215542025-03-07T23:30:47.161ZINFOtest_unauthorized (external client test context): client received response status = 401
215552025-03-07T23:30:47.161ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/projects/demo-project/policy
215562025-03-07T23:30:47.161ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215572025-03-07T23:30:47.162ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e7425cdd-596f-4c01-b03b-9fcb4dbc23e3 uri = /v1/projects/demo-project/policy
215582025-03-07T23:30:47.162ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e7425cdd-596f-4c01-b03b-9fcb4dbc23e3 uri = /v1/projects/demo-project/policy
215592025-03-07T23:30:47.162ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e7425cdd-596f-4c01-b03b-9fcb4dbc23e3 uri = /v1/projects/demo-project/policy
215602025-03-07T23:30:47.162ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 230 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e7425cdd-596f-4c01-b03b-9fcb4dbc23e3 response_code = 401 uri = /v1/projects/demo-project/policy
215612025-03-07T23:30:47.162ZINFOtest_unauthorized (external client test context): client received response status = 401
215622025-03-07T23:30:47.162ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/projects/demo-project/policy
215632025-03-07T23:30:47.163ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215642025-03-07T23:30:47.163ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 86336ee2-ab04-4e41-ba01-e5d849c2ba54 uri = /v1/projects/demo-project/policy
215652025-03-07T23:30:47.163ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 86336ee2-ab04-4e41-ba01-e5d849c2ba54 uri = /v1/projects/demo-project/policy
215662025-03-07T23:30:47.165ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:995:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1009:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::project_policy_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ProjectPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>), dropshot::handler::HttpResponseOk<nexus_types::external_api::shared::Policy<nexus_types::external_api::shared::ProjectRole>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 86336ee2-ab04-4e41-ba01-e5d849c2ba54 uri = /v1/projects/demo-project/policy
215672025-03-07T23:30:47.165ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1683 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 86336ee2-ab04-4e41-ba01-e5d849c2ba54 response_code = 401 uri = /v1/projects/demo-project/policy
215682025-03-07T23:30:47.165ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
215692025-03-07T23:30:47.165ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
215702025-03-07T23:30:47.165ZINFOtest_unauthorized (external client test context): client received response status = 401
215712025-03-07T23:30:47.165ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/projects/demo-project/policy
215722025-03-07T23:30:47.165ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215732025-03-07T23:30:47.165ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df87bc32-6872-4546-928b-ee47cc68a935 uri = /v1/projects/demo-project/policy
215742025-03-07T23:30:47.165ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df87bc32-6872-4546-928b-ee47cc68a935 response_code = 405 uri = /v1/projects/demo-project/policy
215752025-03-07T23:30:47.166ZINFOtest_unauthorized (external client test context): client received response status = 405
215762025-03-07T23:30:47.166ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/projects/demo-project/policy
215772025-03-07T23:30:47.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215782025-03-07T23:30:47.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d551c52-cd7a-4eac-ad48-4eda00872dea uri = /v1/projects/demo-project/policy
215792025-03-07T23:30:47.166ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d551c52-cd7a-4eac-ad48-4eda00872dea response_code = 405 uri = /v1/projects/demo-project/policy
215802025-03-07T23:30:47.167ZINFOtest_unauthorized (external client test context): client received response status = 405
215812025-03-07T23:30:47.167ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/projects/demo-project/policy
215822025-03-07T23:30:47.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215832025-03-07T23:30:47.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1aff7e8b-d7c0-4379-8e21-7ba8710404a2 uri = /v1/projects/demo-project/policy
215842025-03-07T23:30:47.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1aff7e8b-d7c0-4379-8e21-7ba8710404a2 response_code = 405 uri = /v1/projects/demo-project/policy
215852025-03-07T23:30:47.167ZINFOtest_unauthorized (external client test context): client received response status = 405
215862025-03-07T23:30:47.167ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/projects/demo-project/policy
215872025-03-07T23:30:47.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215882025-03-07T23:30:47.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0520621b-c9af-417d-8fad-8487f246d851 uri = /v1/projects/demo-project/policy
215892025-03-07T23:30:47.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0520621b-c9af-417d-8fad-8487f246d851 response_code = 405 uri = /v1/projects/demo-project/policy
215902025-03-07T23:30:47.168ZINFOtest_unauthorized (external client test context): client received response status = 405
215912025-03-07T23:30:47.168ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/projects/demo-project/policy
215922025-03-07T23:30:47.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
215932025-03-07T23:30:47.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 66bb377e-e4a2-4b9d-9168-9f2122244cbc uri = /v1/projects/demo-project/policy
215942025-03-07T23:30:47.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 66bb377e-e4a2-4b9d-9168-9f2122244cbc response_code = 405 uri = /v1/projects/demo-project/policy
215952025-03-07T23:30:47.168ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
215962025-03-07T23:30:47.168ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
215972025-03-07T23:30:47.168ZINFOtest_unauthorized (external client test context): client received response status = 405
215982025-03-07T23:30:47.168ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/projects/demo-project/policy
215992025-03-07T23:30:47.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216002025-03-07T23:30:47.169ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 14de54e5-66c5-4091-a9d9-db37d31f1160 uri = /v1/projects/demo-project/policy
216012025-03-07T23:30:47.169ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 14de54e5-66c5-4091-a9d9-db37d31f1160 response_code = 405 uri = /v1/projects/demo-project/policy
216022025-03-07T23:30:47.169ZINFOtest_unauthorized (external client test context): client received response status = 405
216032025-03-07T23:30:47.169ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/projects/demo-project/policy
216042025-03-07T23:30:47.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216052025-03-07T23:30:47.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 38a05545-8158-46e9-b1f1-228eb27fbb5e uri = /v1/projects/demo-project/policy
216062025-03-07T23:30:47.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 38a05545-8158-46e9-b1f1-228eb27fbb5e response_code = 405 uri = /v1/projects/demo-project/policy
216072025-03-07T23:30:47.170ZINFOtest_unauthorized (external client test context): client received response status = 405
216082025-03-07T23:30:47.170ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/projects/demo-project/policy
216092025-03-07T23:30:47.170ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216102025-03-07T23:30:47.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f81972d6-285d-4dcc-8974-dbe5ad81ff11 uri = /v1/projects/demo-project/policy
216112025-03-07T23:30:47.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f81972d6-285d-4dcc-8974-dbe5ad81ff11 response_code = 405 uri = /v1/projects/demo-project/policy
216122025-03-07T23:30:47.170ZINFOtest_unauthorized (external client test context): client received response status = 405
216132025-03-07T23:30:47.170ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/projects/demo-project/policy
216142025-03-07T23:30:47.170ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216152025-03-07T23:30:47.171ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e6fc585d-57b7-45e6-99a0-ad6a0bbaa1c9 uri = /v1/projects/demo-project/policy
216162025-03-07T23:30:47.176ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 5280 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e6fc585d-57b7-45e6-99a0-ad6a0bbaa1c9 response_code = 405 uri = /v1/projects/demo-project/policy
216172025-03-07T23:30:47.176ZINFOtest_unauthorized (external client test context): client received response status = 405
216182025-03-07T23:30:47.176ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/projects/demo-project/policy
216192025-03-07T23:30:47.177ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216202025-03-07T23:30:47.177ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a5256f71-abbb-4fcd-a8f8-a1f6033e6937 uri = /v1/projects/demo-project/policy
216212025-03-07T23:30:47.177ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a5256f71-abbb-4fcd-a8f8-a1f6033e6937 response_code = 405 uri = /v1/projects/demo-project/policy
216222025-03-07T23:30:47.177ZINFOtest_unauthorized (external client test context): client received response status = 405
216232025-03-07T23:30:47.177ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/projects/demo-project/policy
216242025-03-07T23:30:47.177ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216252025-03-07T23:30:47.180ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9c16f40b-fed5-473f-ab1a-71e1394a6040 uri = /v1/projects/demo-project/policy
216262025-03-07T23:30:47.181ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 87 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9c16f40b-fed5-473f-ab1a-71e1394a6040 response_code = 405 uri = /v1/projects/demo-project/policy
216272025-03-07T23:30:47.181ZINFOtest_unauthorized (external client test context): client received response status = 405
216282025-03-07T23:30:47.181ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/projects/demo-project/policy
216292025-03-07T23:30:47.181ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216302025-03-07T23:30:47.181ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d2cf1c03-3c90-4ec8-985c-f05432bc5fee uri = /v1/projects/demo-project/policy
216312025-03-07T23:30:47.181ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 167 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d2cf1c03-3c90-4ec8-985c-f05432bc5fee response_code = 405 uri = /v1/projects/demo-project/policy
216322025-03-07T23:30:47.181ZINFOtest_unauthorized (external client test context): client received response status = 405
216332025-03-07T23:30:47.181ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/projects/demo-project/policy
216342025-03-07T23:30:47.182ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/projects/demo-project/policy
216352025-03-07T23:30:47.182ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 uri = /v1/projects/demo-project/policy
216362025-03-07T23:30:47.182ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 uri = /v1/projects/demo-project/policy
216372025-03-07T23:30:47.182ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects/demo-project/policy
216382025-03-07T23:30:47.182ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216392025-03-07T23:30:47.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216402025-03-07T23:30:47.224ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216412025-03-07T23:30:47.239ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216422025-03-07T23:30:47.241ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216432025-03-07T23:30:47.242ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216442025-03-07T23:30:47.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
216452025-03-07T23:30:47.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
216462025-03-07T23:30:47.247ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216472025-03-07T23:30:47.248ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216482025-03-07T23:30:47.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216492025-03-07T23:30:47.252ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
216502025-03-07T23:30:47.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216512025-03-07T23:30:47.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216522025-03-07T23:30:47.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216532025-03-07T23:30:47.265ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
216542025-03-07T23:30:47.265ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
216552025-03-07T23:30:47.273ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
216562025-03-07T23:30:47.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216572025-03-07T23:30:47.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216582025-03-07T23:30:47.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216592025-03-07T23:30:47.278ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
216602025-03-07T23:30:47.279ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
216612025-03-07T23:30:47.279ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216622025-03-07T23:30:47.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216632025-03-07T23:30:47.281ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216642025-03-07T23:30:47.287ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
216652025-03-07T23:30:47.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
216662025-03-07T23:30:47.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
216672025-03-07T23:30:47.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
216682025-03-07T23:30:47.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
216692025-03-07T23:30:47.308ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
216702025-03-07T23:30:47.310ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 uri = /v1/projects/demo-project/policy
216712025-03-07T23:30:47.311ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216722025-03-07T23:30:47.312ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216732025-03-07T23:30:47.313ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
216742025-03-07T23:30:47.318ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216752025-03-07T23:30:47.318ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216762025-03-07T23:30:47.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
216772025-03-07T23:30:47.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
216782025-03-07T23:30:47.326ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project/policy
216792025-03-07T23:30:47.327ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216802025-03-07T23:30:47.327ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216812025-03-07T23:30:47.329ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
216822025-03-07T23:30:47.338ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
216832025-03-07T23:30:47.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216842025-03-07T23:30:47.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216852025-03-07T23:30:47.339ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
216862025-03-07T23:30:47.345ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
216872025-03-07T23:30:47.345ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216882025-03-07T23:30:47.345ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216892025-03-07T23:30:47.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
216902025-03-07T23:30:47.350ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
216912025-03-07T23:30:47.359ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
216922025-03-07T23:30:47.360ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216932025-03-07T23:30:47.360ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216942025-03-07T23:30:47.361ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
216952025-03-07T23:30:47.362ZTRACtest_unauthorized (dropshot_external): authorize begin action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/projects/demo-project/policy
216962025-03-07T23:30:47.362ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/projects/demo-project/policy
216972025-03-07T23:30:47.363ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
216982025-03-07T23:30:47.363ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
216992025-03-07T23:30:47.363ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
217002025-03-07T23:30:47.367ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects/demo-project/policy
217012025-03-07T23:30:47.367ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
217022025-03-07T23:30:47.367ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
217032025-03-07T23:30:47.368ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
217042025-03-07T23:30:47.391ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects/demo-project/policy
217052025-03-07T23:30:47.391ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database uri = /v1/projects/demo-project/policy
217062025-03-07T23:30:47.391ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {} } uri = /v1/projects/demo-project/policy
217072025-03-07T23:30:47.392ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Database result = Ok(()) uri = /v1/projects/demo-project/policy
217082025-03-07T23:30:47.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects/demo-project/policy
217092025-03-07T23:30:47.407ZDEBGtest_unauthorized (dropshot_external): authorize result action = ReadPolicy actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/projects/demo-project/policy
217102025-03-07T23:30:47.410ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 227868 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 11b28ef9-93f6-4bcf-b399-077cac523401 response_code = 200 uri = /v1/projects/demo-project/policy
217112025-03-07T23:30:47.410ZINFOtest_unauthorized (external client test context): client received response status = 200
217122025-03-07T23:30:47.410ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpcs?project=demo-project
217132025-03-07T23:30:47.410ZINFOtest_unauthorized: test: privileged GET url = /v1/vpcs?project=demo-project
217142025-03-07T23:30:47.410ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
217152025-03-07T23:30:47.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
217162025-03-07T23:30:47.411ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
217172025-03-07T23:30:47.411ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 82d88dfc-a24c-4ad0-85f8-0707112ef588 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
217182025-03-07T23:30:47.411ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 uri = /v1/vpcs?project=demo-project
217192025-03-07T23:30:47.411ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 82d88dfc-a24c-4ad0-85f8-0707112ef588 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
217202025-03-07T23:30:47.412ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 82d88dfc-a24c-4ad0-85f8-0707112ef588 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
217212025-03-07T23:30:47.412ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 82d88dfc-a24c-4ad0-85f8-0707112ef588 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
217222025-03-07T23:30:47.412ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 uri = /v1/vpcs?project=demo-project
217232025-03-07T23:30:47.412ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=demo-project
217242025-03-07T23:30:47.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217252025-03-07T23:30:47.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217262025-03-07T23:30:47.413ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217272025-03-07T23:30:47.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217282025-03-07T23:30:47.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217292025-03-07T23:30:47.417ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217302025-03-07T23:30:47.417ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5992 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 82d88dfc-a24c-4ad0-85f8-0707112ef588 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
217312025-03-07T23:30:47.419ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "82d88dfc-a24c-4ad0-85f8-0707112ef588", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:46 GMT"} })
217322025-03-07T23:30:47.419ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
217332025-03-07T23:30:47.420ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7b378639-e39d-4bac-a771-ac997f79d93b uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
217342025-03-07T23:30:47.420ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7b378639-e39d-4bac-a771-ac997f79d93b resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
217352025-03-07T23:30:47.420ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7b378639-e39d-4bac-a771-ac997f79d93b roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
217362025-03-07T23:30:47.421ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7b378639-e39d-4bac-a771-ac997f79d93b resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
217372025-03-07T23:30:47.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
217382025-03-07T23:30:47.421ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
217392025-03-07T23:30:47.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217402025-03-07T23:30:47.421ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217412025-03-07T23:30:47.421ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217422025-03-07T23:30:47.423ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3710 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7b378639-e39d-4bac-a771-ac997f79d93b response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
217432025-03-07T23:30:47.424ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "7b378639-e39d-4bac-a771-ac997f79d93b", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:46 GMT"} })
217442025-03-07T23:30:47.424ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
217452025-03-07T23:30:47.424ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
217462025-03-07T23:30:47.424ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
217472025-03-07T23:30:47.424ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
217482025-03-07T23:30:47.424ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217492025-03-07T23:30:47.424ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217502025-03-07T23:30:47.425ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217512025-03-07T23:30:47.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
217522025-03-07T23:30:47.439ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
217532025-03-07T23:30:47.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217542025-03-07T23:30:47.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217552025-03-07T23:30:47.440ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217562025-03-07T23:30:47.448ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
217572025-03-07T23:30:47.449ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
217582025-03-07T23:30:47.449ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217592025-03-07T23:30:47.449ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217602025-03-07T23:30:47.450ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217612025-03-07T23:30:47.464ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
217622025-03-07T23:30:47.464ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
217632025-03-07T23:30:47.464ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
217642025-03-07T23:30:47.465ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
217652025-03-07T23:30:47.470ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
217662025-03-07T23:30:47.488ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
217672025-03-07T23:30:47.488ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 uri = /v1/vpcs?project=demo-project
217682025-03-07T23:30:47.488ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
217692025-03-07T23:30:47.488ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217702025-03-07T23:30:47.489ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217712025-03-07T23:30:47.499ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
217722025-03-07T23:30:47.500ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217732025-03-07T23:30:47.501ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217742025-03-07T23:30:47.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
217752025-03-07T23:30:47.504ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
217762025-03-07T23:30:47.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
217772025-03-07T23:30:47.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217782025-03-07T23:30:47.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217792025-03-07T23:30:47.509ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
217802025-03-07T23:30:47.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
217812025-03-07T23:30:47.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217822025-03-07T23:30:47.510ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217832025-03-07T23:30:47.532ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
217842025-03-07T23:30:47.543ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
217852025-03-07T23:30:47.543ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217862025-03-07T23:30:47.544ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217872025-03-07T23:30:47.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
217882025-03-07T23:30:47.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
217892025-03-07T23:30:47.573ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
217902025-03-07T23:30:47.591ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
217912025-03-07T23:30:47.591ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
217922025-03-07T23:30:47.591ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
217932025-03-07T23:30:47.591ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
217942025-03-07T23:30:47.591ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
217952025-03-07T23:30:47.591ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
217962025-03-07T23:30:47.599ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
217972025-03-07T23:30:47.599ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
217982025-03-07T23:30:47.599ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
217992025-03-07T23:30:47.599ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
218002025-03-07T23:30:47.599ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
218012025-03-07T23:30:47.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
218022025-03-07T23:30:47.600ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218032025-03-07T23:30:47.600ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218042025-03-07T23:30:47.604ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
218052025-03-07T23:30:47.605ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
218062025-03-07T23:30:47.605ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218072025-03-07T23:30:47.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218082025-03-07T23:30:47.626ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
218092025-03-07T23:30:47.668ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
218102025-03-07T23:30:47.668ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database uri = /v1/vpcs?project=demo-project
218112025-03-07T23:30:47.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218122025-03-07T23:30:47.668ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218132025-03-07T23:30:47.679ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 267523 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 79cd69af-6cc0-428f-a8ca-256366e13a15 response_code = 200 uri = /v1/vpcs?project=demo-project
218142025-03-07T23:30:47.681ZINFOtest_unauthorized (external client test context): client received response status = 200
218152025-03-07T23:30:47.682ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpcs?project=demo-project
218162025-03-07T23:30:47.682ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
218172025-03-07T23:30:47.683ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce uri = /v1/vpcs?project=demo-project
218182025-03-07T23:30:47.683ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce uri = /v1/vpcs?project=demo-project
218192025-03-07T23:30:47.683ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs?project=demo-project
218202025-03-07T23:30:47.683ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218212025-03-07T23:30:47.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218222025-03-07T23:30:47.685ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218232025-03-07T23:30:47.691ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218242025-03-07T23:30:47.691ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218252025-03-07T23:30:47.692ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218262025-03-07T23:30:47.710ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
218272025-03-07T23:30:47.711ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
218282025-03-07T23:30:47.711ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218292025-03-07T23:30:47.711ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218302025-03-07T23:30:47.712ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218312025-03-07T23:30:47.715ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
218322025-03-07T23:30:47.715ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218332025-03-07T23:30:47.715ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218342025-03-07T23:30:47.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218352025-03-07T23:30:47.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
218362025-03-07T23:30:47.734ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
218372025-03-07T23:30:47.734ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218382025-03-07T23:30:47.734ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218392025-03-07T23:30:47.735ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218402025-03-07T23:30:47.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
218412025-03-07T23:30:47.768ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
218422025-03-07T23:30:47.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218432025-03-07T23:30:47.768ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218442025-03-07T23:30:47.768ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218452025-03-07T23:30:47.783ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
218462025-03-07T23:30:47.812ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
218472025-03-07T23:30:47.812ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
218482025-03-07T23:30:47.813ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
218492025-03-07T23:30:47.821ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
218502025-03-07T23:30:47.829ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
218512025-03-07T23:30:47.864ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce uri = /v1/vpcs?project=demo-project
218522025-03-07T23:30:47.864ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database uri = /v1/vpcs?project=demo-project
218532025-03-07T23:30:47.864ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218542025-03-07T23:30:47.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218552025-03-07T23:30:47.866ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
218562025-03-07T23:30:47.866ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
218572025-03-07T23:30:47.893ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database uri = /v1/vpcs?project=demo-project
218582025-03-07T23:30:47.893ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218592025-03-07T23:30:47.895ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218602025-03-07T23:30:47.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
218612025-03-07T23:30:47.907ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
218622025-03-07T23:30:47.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database uri = /v1/vpcs?project=demo-project
218632025-03-07T23:30:47.907ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218642025-03-07T23:30:47.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218652025-03-07T23:30:47.921ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
218662025-03-07T23:30:47.921ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database uri = /v1/vpcs?project=demo-project
218672025-03-07T23:30:47.921ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218682025-03-07T23:30:47.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218692025-03-07T23:30:47.929ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
218702025-03-07T23:30:47.929ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database uri = /v1/vpcs?project=demo-project
218712025-03-07T23:30:47.929ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218722025-03-07T23:30:47.931ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
218732025-03-07T23:30:47.941ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
218742025-03-07T23:30:47.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/vpcs?project=demo-project
218752025-03-07T23:30:47.967ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 284991 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 077325ca-3fad-43f5-9b6b-f3ec5b6ce5ce response_code = 404 uri = /v1/vpcs?project=demo-project
218762025-03-07T23:30:47.968ZINFOtest_unauthorized (external client test context): client received response status = 404
218772025-03-07T23:30:47.969ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpcs?project=demo-project
218782025-03-07T23:30:47.969ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
218792025-03-07T23:30:47.969ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6074d6e8-e332-4613-9cd1-6c826684b3ad uri = /v1/vpcs?project=demo-project
218802025-03-07T23:30:47.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6074d6e8-e332-4613-9cd1-6c826684b3ad uri = /v1/vpcs?project=demo-project
218812025-03-07T23:30:47.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6074d6e8-e332-4613-9cd1-6c826684b3ad uri = /v1/vpcs?project=demo-project
218822025-03-07T23:30:47.970ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6074d6e8-e332-4613-9cd1-6c826684b3ad uri = /v1/vpcs?project=demo-project
218832025-03-07T23:30:47.970ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 312 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6074d6e8-e332-4613-9cd1-6c826684b3ad response_code = 401 uri = /v1/vpcs?project=demo-project
218842025-03-07T23:30:47.970ZINFOtest_unauthorized (external client test context): client received response status = 401
218852025-03-07T23:30:47.970ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpcs?project=demo-project
218862025-03-07T23:30:47.970ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
218872025-03-07T23:30:47.970ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5e13cd1a-9316-45a6-b25f-72f6e60eb220 uri = /v1/vpcs?project=demo-project
218882025-03-07T23:30:47.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5e13cd1a-9316-45a6-b25f-72f6e60eb220 uri = /v1/vpcs?project=demo-project
218892025-03-07T23:30:47.970ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5e13cd1a-9316-45a6-b25f-72f6e60eb220 uri = /v1/vpcs?project=demo-project
218902025-03-07T23:30:47.971ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 193 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5e13cd1a-9316-45a6-b25f-72f6e60eb220 response_code = 401 uri = /v1/vpcs?project=demo-project
218912025-03-07T23:30:47.971ZINFOtest_unauthorized (external client test context): client received response status = 401
218922025-03-07T23:30:47.971ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpcs?project=demo-project
218932025-03-07T23:30:47.971ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
218942025-03-07T23:30:47.971ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0890a34d-c0cd-4117-b176-0abd75702bad uri = /v1/vpcs?project=demo-project
218952025-03-07T23:30:47.971ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0890a34d-c0cd-4117-b176-0abd75702bad uri = /v1/vpcs?project=demo-project
218962025-03-07T23:30:47.974ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4910:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Vpc>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4930:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Vpc>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Vpc>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0890a34d-c0cd-4117-b176-0abd75702bad uri = /v1/vpcs?project=demo-project
218972025-03-07T23:30:47.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2229 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0890a34d-c0cd-4117-b176-0abd75702bad response_code = 401 uri = /v1/vpcs?project=demo-project
218982025-03-07T23:30:47.974ZINFOtest_unauthorized (external client test context): client received response status = 401
218992025-03-07T23:30:47.974ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpcs?project=demo-project
219002025-03-07T23:30:47.974ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219012025-03-07T23:30:47.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f37af107-c289-4135-b052-17e172c4a2fe uri = /v1/vpcs?project=demo-project
219022025-03-07T23:30:47.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f37af107-c289-4135-b052-17e172c4a2fe response_code = 405 uri = /v1/vpcs?project=demo-project
219032025-03-07T23:30:47.974ZINFOtest_unauthorized (external client test context): client received response status = 405
219042025-03-07T23:30:47.974ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpcs?project=demo-project
219052025-03-07T23:30:47.974ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219062025-03-07T23:30:47.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = da8d2ded-8234-4a3f-8b0a-effeca13a900 uri = /v1/vpcs?project=demo-project
219072025-03-07T23:30:47.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = da8d2ded-8234-4a3f-8b0a-effeca13a900 response_code = 405 uri = /v1/vpcs?project=demo-project
219082025-03-07T23:30:47.975ZINFOtest_unauthorized (external client test context): client received response status = 405
219092025-03-07T23:30:47.975ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpcs?project=demo-project
219102025-03-07T23:30:47.975ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219112025-03-07T23:30:47.975ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e2548d42-7192-4f2d-9c30-354ad5605843 uri = /v1/vpcs?project=demo-project
219122025-03-07T23:30:47.975ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e2548d42-7192-4f2d-9c30-354ad5605843 response_code = 405 uri = /v1/vpcs?project=demo-project
219132025-03-07T23:30:47.975ZINFOtest_unauthorized (external client test context): client received response status = 405
219142025-03-07T23:30:47.975ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpcs?project=demo-project
219152025-03-07T23:30:47.975ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219162025-03-07T23:30:47.975ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e7472384-0efe-48cd-a716-c4bf0ee51d30 uri = /v1/vpcs?project=demo-project
219172025-03-07T23:30:47.975ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e7472384-0efe-48cd-a716-c4bf0ee51d30 response_code = 405 uri = /v1/vpcs?project=demo-project
219182025-03-07T23:30:47.976ZINFOtest_unauthorized (external client test context): client received response status = 405
219192025-03-07T23:30:47.976ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpcs?project=demo-project
219202025-03-07T23:30:47.976ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219212025-03-07T23:30:47.976ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c uri = /v1/vpcs?project=demo-project
219222025-03-07T23:30:47.976ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c uri = /v1/vpcs?project=demo-project
219232025-03-07T23:30:47.977ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs?project=demo-project
219242025-03-07T23:30:47.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219252025-03-07T23:30:47.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219262025-03-07T23:30:47.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219272025-03-07T23:30:47.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219282025-03-07T23:30:47.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219292025-03-07T23:30:47.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219302025-03-07T23:30:47.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
219312025-03-07T23:30:47.988ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
219322025-03-07T23:30:47.988ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219332025-03-07T23:30:47.988ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219342025-03-07T23:30:47.989ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219352025-03-07T23:30:47.992ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
219362025-03-07T23:30:47.992ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219372025-03-07T23:30:47.992ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219382025-03-07T23:30:47.992ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219392025-03-07T23:30:47.996ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
219402025-03-07T23:30:48.001ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
219412025-03-07T23:30:48.001ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219422025-03-07T23:30:48.001ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219432025-03-07T23:30:48.002ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219442025-03-07T23:30:48.006ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
219452025-03-07T23:30:48.006ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
219462025-03-07T23:30:48.006ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219472025-03-07T23:30:48.006ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219482025-03-07T23:30:48.006ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219492025-03-07T23:30:48.008ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
219502025-03-07T23:30:48.008ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
219512025-03-07T23:30:48.008ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
219522025-03-07T23:30:48.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
219532025-03-07T23:30:48.010ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
219542025-03-07T23:30:48.016ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
219552025-03-07T23:30:48.016ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c uri = /v1/vpcs?project=demo-project
219562025-03-07T23:30:48.016ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database uri = /v1/vpcs?project=demo-project
219572025-03-07T23:30:48.016ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219582025-03-07T23:30:48.016ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
219592025-03-07T23:30:48.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database uri = /v1/vpcs?project=demo-project
219602025-03-07T23:30:48.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219612025-03-07T23:30:48.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
219622025-03-07T23:30:48.023ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
219632025-03-07T23:30:48.024ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
219642025-03-07T23:30:48.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database uri = /v1/vpcs?project=demo-project
219652025-03-07T23:30:48.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219662025-03-07T23:30:48.026ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
219672025-03-07T23:30:48.029ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
219682025-03-07T23:30:48.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database uri = /v1/vpcs?project=demo-project
219692025-03-07T23:30:48.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219702025-03-07T23:30:48.030ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
219712025-03-07T23:30:48.033ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
219722025-03-07T23:30:48.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database uri = /v1/vpcs?project=demo-project
219732025-03-07T23:30:48.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219742025-03-07T23:30:48.036ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
219752025-03-07T23:30:48.040ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
219762025-03-07T23:30:48.074ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/vpcs?project=demo-project
219772025-03-07T23:30:48.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 98542 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df8d988e-aa20-4b63-aec1-6d415f3ff32c response_code = 404 uri = /v1/vpcs?project=demo-project
219782025-03-07T23:30:48.083ZINFOtest_unauthorized (external client test context): client received response status = 404
219792025-03-07T23:30:48.084ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpcs?project=demo-project
219802025-03-07T23:30:48.084ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219812025-03-07T23:30:48.085ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0fd7fcb9-e182-43e0-b59a-bb31769a37b1 uri = /v1/vpcs?project=demo-project
219822025-03-07T23:30:48.085ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0fd7fcb9-e182-43e0-b59a-bb31769a37b1 uri = /v1/vpcs?project=demo-project
219832025-03-07T23:30:48.085ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0fd7fcb9-e182-43e0-b59a-bb31769a37b1 uri = /v1/vpcs?project=demo-project
219842025-03-07T23:30:48.085ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0fd7fcb9-e182-43e0-b59a-bb31769a37b1 uri = /v1/vpcs?project=demo-project
219852025-03-07T23:30:48.086ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 949 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0fd7fcb9-e182-43e0-b59a-bb31769a37b1 response_code = 401 uri = /v1/vpcs?project=demo-project
219862025-03-07T23:30:48.086ZINFOtest_unauthorized (external client test context): client received response status = 401
219872025-03-07T23:30:48.087ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpcs?project=demo-project
219882025-03-07T23:30:48.087ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219892025-03-07T23:30:48.087ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2b51ddfa-9529-4261-80b0-eeebeb8be9ba uri = /v1/vpcs?project=demo-project
219902025-03-07T23:30:48.087ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2b51ddfa-9529-4261-80b0-eeebeb8be9ba uri = /v1/vpcs?project=demo-project
219912025-03-07T23:30:48.087ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2b51ddfa-9529-4261-80b0-eeebeb8be9ba uri = /v1/vpcs?project=demo-project
219922025-03-07T23:30:48.088ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 514 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2b51ddfa-9529-4261-80b0-eeebeb8be9ba response_code = 401 uri = /v1/vpcs?project=demo-project
219932025-03-07T23:30:48.088ZINFOtest_unauthorized (external client test context): client received response status = 401
219942025-03-07T23:30:48.088ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpcs?project=demo-project
219952025-03-07T23:30:48.088ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
219962025-03-07T23:30:48.089ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e9787dd5-7fc9-4708-9204-abecb5fc4aa0 uri = /v1/vpcs?project=demo-project
219972025-03-07T23:30:48.089ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e9787dd5-7fc9-4708-9204-abecb5fc4aa0 uri = /v1/vpcs?project=demo-project
219982025-03-07T23:30:48.091ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4944:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Vpc>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4955:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Vpc>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Vpc>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e9787dd5-7fc9-4708-9204-abecb5fc4aa0 uri = /v1/vpcs?project=demo-project
219992025-03-07T23:30:48.091ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2147 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e9787dd5-7fc9-4708-9204-abecb5fc4aa0 response_code = 401 uri = /v1/vpcs?project=demo-project
220002025-03-07T23:30:48.092ZINFOtest_unauthorized (external client test context): client received response status = 401
220012025-03-07T23:30:48.092ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpcs?project=demo-project
220022025-03-07T23:30:48.092ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220032025-03-07T23:30:48.093ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d6454097-236d-4e36-97a5-6beac20a3aa9 uri = /v1/vpcs?project=demo-project
220042025-03-07T23:30:48.093ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 97 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d6454097-236d-4e36-97a5-6beac20a3aa9 response_code = 405 uri = /v1/vpcs?project=demo-project
220052025-03-07T23:30:48.093ZINFOtest_unauthorized (external client test context): client received response status = 405
220062025-03-07T23:30:48.093ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpcs?project=demo-project
220072025-03-07T23:30:48.093ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220082025-03-07T23:30:48.093ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8a448e21-0893-4ff1-95e5-4c653ef964c5 uri = /v1/vpcs?project=demo-project
220092025-03-07T23:30:48.093ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 111 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8a448e21-0893-4ff1-95e5-4c653ef964c5 response_code = 405 uri = /v1/vpcs?project=demo-project
220102025-03-07T23:30:48.094ZINFOtest_unauthorized (external client test context): client received response status = 405
220112025-03-07T23:30:48.094ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpcs?project=demo-project
220122025-03-07T23:30:48.094ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220132025-03-07T23:30:48.094ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 03cbb6ee-3950-4799-b3e4-21eacefa3f39 uri = /v1/vpcs?project=demo-project
220142025-03-07T23:30:48.094ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 194 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 03cbb6ee-3950-4799-b3e4-21eacefa3f39 response_code = 405 uri = /v1/vpcs?project=demo-project
220152025-03-07T23:30:48.095ZINFOtest_unauthorized (external client test context): client received response status = 405
220162025-03-07T23:30:48.095ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpcs?project=demo-project
220172025-03-07T23:30:48.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220182025-03-07T23:30:48.097ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = abef64bc-c660-4f8e-a5e2-eb9d8899efd6 uri = /v1/vpcs?project=demo-project
220192025-03-07T23:30:48.097ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 219 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = abef64bc-c660-4f8e-a5e2-eb9d8899efd6 response_code = 405 uri = /v1/vpcs?project=demo-project
220202025-03-07T23:30:48.097ZINFOtest_unauthorized (external client test context): client received response status = 405
220212025-03-07T23:30:48.097ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpcs?project=demo-project
220222025-03-07T23:30:48.099ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220232025-03-07T23:30:48.099ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 37f45eac-0dfc-45b7-9b91-dc4895034f96 uri = /v1/vpcs?project=demo-project
220242025-03-07T23:30:48.100ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 835 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 37f45eac-0dfc-45b7-9b91-dc4895034f96 response_code = 405 uri = /v1/vpcs?project=demo-project
220252025-03-07T23:30:48.100ZINFOtest_unauthorized (external client test context): client received response status = 405
220262025-03-07T23:30:48.100ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpcs?project=demo-project
220272025-03-07T23:30:48.100ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220282025-03-07T23:30:48.100ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f7f4ec55-6773-451f-9d97-018e256a15da uri = /v1/vpcs?project=demo-project
220292025-03-07T23:30:48.100ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f7f4ec55-6773-451f-9d97-018e256a15da response_code = 405 uri = /v1/vpcs?project=demo-project
220302025-03-07T23:30:48.101ZINFOtest_unauthorized (external client test context): client received response status = 405
220312025-03-07T23:30:48.101ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpcs?project=demo-project
220322025-03-07T23:30:48.101ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220332025-03-07T23:30:48.101ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a7e5781d-d814-46a2-907b-2f430b9a0811 uri = /v1/vpcs?project=demo-project
220342025-03-07T23:30:48.101ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 204 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a7e5781d-d814-46a2-907b-2f430b9a0811 response_code = 405 uri = /v1/vpcs?project=demo-project
220352025-03-07T23:30:48.101ZINFOtest_unauthorized (external client test context): client received response status = 405
220362025-03-07T23:30:48.102ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpcs?project=demo-project
220372025-03-07T23:30:48.102ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220382025-03-07T23:30:48.102ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c6670180-8d44-49c0-a312-1a0026c95fab uri = /v1/vpcs?project=demo-project
220392025-03-07T23:30:48.102ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c6670180-8d44-49c0-a312-1a0026c95fab response_code = 405 uri = /v1/vpcs?project=demo-project
220402025-03-07T23:30:48.102ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
220412025-03-07T23:30:48.103ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
220422025-03-07T23:30:48.103ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
220432025-03-07T23:30:48.103ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
220442025-03-07T23:30:48.104ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
220452025-03-07T23:30:48.104ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
220462025-03-07T23:30:48.104ZINFOtest_unauthorized (external client test context): client received response status = 405
220472025-03-07T23:30:48.104ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpcs?project=demo-project
220482025-03-07T23:30:48.104ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs?project=demo-project
220492025-03-07T23:30:48.104ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 uri = /v1/vpcs?project=demo-project
220502025-03-07T23:30:48.104ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 uri = /v1/vpcs?project=demo-project
220512025-03-07T23:30:48.104ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=demo-project
220522025-03-07T23:30:48.104ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220532025-03-07T23:30:48.104ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220542025-03-07T23:30:48.105ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220552025-03-07T23:30:48.111ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220562025-03-07T23:30:48.111ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220572025-03-07T23:30:48.112ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220582025-03-07T23:30:48.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
220592025-03-07T23:30:48.116ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
220602025-03-07T23:30:48.116ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220612025-03-07T23:30:48.116ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220622025-03-07T23:30:48.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220632025-03-07T23:30:48.121ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
220642025-03-07T23:30:48.121ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220652025-03-07T23:30:48.121ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220662025-03-07T23:30:48.122ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220672025-03-07T23:30:48.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
220682025-03-07T23:30:48.131ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
220692025-03-07T23:30:48.131ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220702025-03-07T23:30:48.131ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220712025-03-07T23:30:48.132ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220722025-03-07T23:30:48.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
220732025-03-07T23:30:48.138ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
220742025-03-07T23:30:48.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220752025-03-07T23:30:48.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220762025-03-07T23:30:48.139ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220772025-03-07T23:30:48.142ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
220782025-03-07T23:30:48.142ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
220792025-03-07T23:30:48.142ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
220802025-03-07T23:30:48.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
220812025-03-07T23:30:48.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
220822025-03-07T23:30:48.149ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
220832025-03-07T23:30:48.150ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 uri = /v1/vpcs?project=demo-project
220842025-03-07T23:30:48.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
220852025-03-07T23:30:48.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
220862025-03-07T23:30:48.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
220872025-03-07T23:30:48.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
220882025-03-07T23:30:48.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
220892025-03-07T23:30:48.158ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
220902025-03-07T23:30:48.160ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
220912025-03-07T23:30:48.160ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
220922025-03-07T23:30:48.160ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
220932025-03-07T23:30:48.161ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
220942025-03-07T23:30:48.168ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
220952025-03-07T23:30:48.168ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
220962025-03-07T23:30:48.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
220972025-03-07T23:30:48.168ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
220982025-03-07T23:30:48.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
220992025-03-07T23:30:48.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221002025-03-07T23:30:48.169ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221012025-03-07T23:30:48.172ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
221022025-03-07T23:30:48.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
221032025-03-07T23:30:48.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221042025-03-07T23:30:48.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221052025-03-07T23:30:48.175ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
221062025-03-07T23:30:48.175ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
221072025-03-07T23:30:48.176ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
221082025-03-07T23:30:48.176ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
221092025-03-07T23:30:48.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221102025-03-07T23:30:48.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221112025-03-07T23:30:48.184ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
221122025-03-07T23:30:48.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
221132025-03-07T23:30:48.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/vpcs?project=demo-project
221142025-03-07T23:30:48.198ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs?project=demo-project
221152025-03-07T23:30:48.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
221162025-03-07T23:30:48.198ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221172025-03-07T23:30:48.199ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221182025-03-07T23:30:48.204ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs?project=demo-project
221192025-03-07T23:30:48.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
221202025-03-07T23:30:48.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221212025-03-07T23:30:48.205ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221222025-03-07T23:30:48.208ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs?project=demo-project
221232025-03-07T23:30:48.208ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
221242025-03-07T23:30:48.208ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221252025-03-07T23:30:48.209ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221262025-03-07T23:30:48.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs?project=demo-project
221272025-03-07T23:30:48.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/vpcs?project=demo-project
221282025-03-07T23:30:48.229ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database uri = /v1/vpcs?project=demo-project
221292025-03-07T23:30:48.230ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 roles = RoleSet { roles: {} } uri = /v1/vpcs?project=demo-project
221302025-03-07T23:30:48.231ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 resource = Database result = Ok(()) uri = /v1/vpcs?project=demo-project
221312025-03-07T23:30:48.241ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 137051 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3f19df35-046b-4dea-a2ff-1452df4f9cb0 response_code = 200 uri = /v1/vpcs?project=demo-project
221322025-03-07T23:30:48.242ZINFOtest_unauthorized (external client test context): client received response status = 200
221332025-03-07T23:30:48.242ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpcs/demo-vpc?project=demo-project
221342025-03-07T23:30:48.242ZINFOtest_unauthorized: test: privileged GET url = /v1/vpcs/demo-vpc?project=demo-project
221352025-03-07T23:30:48.242ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
221362025-03-07T23:30:48.242ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f uri = /v1/vpcs/demo-vpc?project=demo-project
221372025-03-07T23:30:48.243ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f uri = /v1/vpcs/demo-vpc?project=demo-project
221382025-03-07T23:30:48.243ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs/demo-vpc?project=demo-project
221392025-03-07T23:30:48.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221402025-03-07T23:30:48.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221412025-03-07T23:30:48.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221422025-03-07T23:30:48.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221432025-03-07T23:30:48.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221442025-03-07T23:30:48.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221452025-03-07T23:30:48.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
221462025-03-07T23:30:48.249ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
221472025-03-07T23:30:48.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221482025-03-07T23:30:48.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221492025-03-07T23:30:48.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221502025-03-07T23:30:48.253ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
221512025-03-07T23:30:48.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221522025-03-07T23:30:48.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221532025-03-07T23:30:48.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221542025-03-07T23:30:48.258ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
221552025-03-07T23:30:48.267ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
221562025-03-07T23:30:48.267ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221572025-03-07T23:30:48.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221582025-03-07T23:30:48.269ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221592025-03-07T23:30:48.270ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
221602025-03-07T23:30:48.272ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
221612025-03-07T23:30:48.272ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
221622025-03-07T23:30:48.272ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221632025-03-07T23:30:48.272ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221642025-03-07T23:30:48.273ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221652025-03-07T23:30:48.275ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
221662025-03-07T23:30:48.275ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
221672025-03-07T23:30:48.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
221682025-03-07T23:30:48.276ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
221692025-03-07T23:30:48.278ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
221702025-03-07T23:30:48.288ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
221712025-03-07T23:30:48.288ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f uri = /v1/vpcs/demo-vpc?project=demo-project
221722025-03-07T23:30:48.288ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221732025-03-07T23:30:48.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221742025-03-07T23:30:48.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221752025-03-07T23:30:48.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221762025-03-07T23:30:48.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221772025-03-07T23:30:48.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221782025-03-07T23:30:48.294ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221792025-03-07T23:30:48.294ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221802025-03-07T23:30:48.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221812025-03-07T23:30:48.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
221822025-03-07T23:30:48.298ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
221832025-03-07T23:30:48.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221842025-03-07T23:30:48.298ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221852025-03-07T23:30:48.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221862025-03-07T23:30:48.302ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
221872025-03-07T23:30:48.302ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221882025-03-07T23:30:48.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221892025-03-07T23:30:48.302ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221902025-03-07T23:30:48.305ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
221912025-03-07T23:30:48.305ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
221922025-03-07T23:30:48.305ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
221932025-03-07T23:30:48.306ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221942025-03-07T23:30:48.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs/demo-vpc?project=demo-project
221952025-03-07T23:30:48.320ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
221962025-03-07T23:30:48.320ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 78039 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b5c7f991-0de9-4a5a-adc1-986a8ae6d97f response_code = 200 uri = /v1/vpcs/demo-vpc?project=demo-project
221972025-03-07T23:30:48.321ZINFOtest_unauthorized (external client test context): client received response status = 200
221982025-03-07T23:30:48.321ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpcs/demo-vpc?project=demo-project
221992025-03-07T23:30:48.321ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
222002025-03-07T23:30:48.321ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 uri = /v1/vpcs/demo-vpc?project=demo-project
222012025-03-07T23:30:48.322ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 uri = /v1/vpcs/demo-vpc?project=demo-project
222022025-03-07T23:30:48.322ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs/demo-vpc?project=demo-project
222032025-03-07T23:30:48.322ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222042025-03-07T23:30:48.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222052025-03-07T23:30:48.322ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222062025-03-07T23:30:48.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222072025-03-07T23:30:48.327ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222082025-03-07T23:30:48.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222092025-03-07T23:30:48.332ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
222102025-03-07T23:30:48.332ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
222112025-03-07T23:30:48.332ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222122025-03-07T23:30:48.332ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222132025-03-07T23:30:48.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222142025-03-07T23:30:48.336ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
222152025-03-07T23:30:48.337ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222162025-03-07T23:30:48.337ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222172025-03-07T23:30:48.337ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222182025-03-07T23:30:48.340ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
222192025-03-07T23:30:48.344ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
222202025-03-07T23:30:48.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222212025-03-07T23:30:48.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222222025-03-07T23:30:48.344ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222232025-03-07T23:30:48.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
222242025-03-07T23:30:48.347ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
222252025-03-07T23:30:48.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222262025-03-07T23:30:48.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222272025-03-07T23:30:48.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222282025-03-07T23:30:48.350ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
222292025-03-07T23:30:48.350ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222302025-03-07T23:30:48.350ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222312025-03-07T23:30:48.352ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222322025-03-07T23:30:48.362ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
222332025-03-07T23:30:48.367ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
222342025-03-07T23:30:48.367ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 uri = /v1/vpcs/demo-vpc?project=demo-project
222352025-03-07T23:30:48.368ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222362025-03-07T23:30:48.368ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222372025-03-07T23:30:48.368ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222382025-03-07T23:30:48.370ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222392025-03-07T23:30:48.370ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222402025-03-07T23:30:48.375ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222412025-03-07T23:30:48.378ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222422025-03-07T23:30:48.378ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222432025-03-07T23:30:48.379ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222442025-03-07T23:30:48.381ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
222452025-03-07T23:30:48.381ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
222462025-03-07T23:30:48.382ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222472025-03-07T23:30:48.382ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222482025-03-07T23:30:48.383ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222492025-03-07T23:30:48.387ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
222502025-03-07T23:30:48.388ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222512025-03-07T23:30:48.388ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222522025-03-07T23:30:48.388ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222532025-03-07T23:30:48.393ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
222542025-03-07T23:30:48.393ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
222552025-03-07T23:30:48.394ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222562025-03-07T23:30:48.395ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
222572025-03-07T23:30:48.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
222582025-03-07T23:30:48.415ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpcs/demo-vpc?project=demo-project
222592025-03-07T23:30:48.415ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 93826 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66dc0667-33c9-4a05-9555-15e806a1ee47 response_code = 404 uri = /v1/vpcs/demo-vpc?project=demo-project
222602025-03-07T23:30:48.416ZINFOtest_unauthorized (external client test context): client received response status = 404
222612025-03-07T23:30:48.416ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpcs/demo-vpc?project=demo-project
222622025-03-07T23:30:48.417ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
222632025-03-07T23:30:48.417ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7390add4-a9b0-4b40-bc81-2884eb444ad8 uri = /v1/vpcs/demo-vpc?project=demo-project
222642025-03-07T23:30:48.417ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7390add4-a9b0-4b40-bc81-2884eb444ad8 uri = /v1/vpcs/demo-vpc?project=demo-project
222652025-03-07T23:30:48.417ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7390add4-a9b0-4b40-bc81-2884eb444ad8 uri = /v1/vpcs/demo-vpc?project=demo-project
222662025-03-07T23:30:48.417ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7390add4-a9b0-4b40-bc81-2884eb444ad8 uri = /v1/vpcs/demo-vpc?project=demo-project
222672025-03-07T23:30:48.418ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 850 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7390add4-a9b0-4b40-bc81-2884eb444ad8 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
222682025-03-07T23:30:48.418ZINFOtest_unauthorized (external client test context): client received response status = 401
222692025-03-07T23:30:48.418ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpcs/demo-vpc?project=demo-project
222702025-03-07T23:30:48.418ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
222712025-03-07T23:30:48.419ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6fc7c1ff-875e-4037-9954-0b3764971bd9 uri = /v1/vpcs/demo-vpc?project=demo-project
222722025-03-07T23:30:48.419ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6fc7c1ff-875e-4037-9954-0b3764971bd9 uri = /v1/vpcs/demo-vpc?project=demo-project
222732025-03-07T23:30:48.419ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6fc7c1ff-875e-4037-9954-0b3764971bd9 uri = /v1/vpcs/demo-vpc?project=demo-project
222742025-03-07T23:30:48.419ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 512 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6fc7c1ff-875e-4037-9954-0b3764971bd9 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
222752025-03-07T23:30:48.419ZINFOtest_unauthorized (external client test context): client received response status = 401
222762025-03-07T23:30:48.420ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpcs/demo-vpc?project=demo-project
222772025-03-07T23:30:48.420ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
222782025-03-07T23:30:48.420ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9f74c07-2471-4208-bd31-22466baa1339 uri = /v1/vpcs/demo-vpc?project=demo-project
222792025-03-07T23:30:48.420ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9f74c07-2471-4208-bd31-22466baa1339 uri = /v1/vpcs/demo-vpc?project=demo-project
222802025-03-07T23:30:48.422ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4969:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4980:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9f74c07-2471-4208-bd31-22466baa1339 uri = /v1/vpcs/demo-vpc?project=demo-project
222812025-03-07T23:30:48.422ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1811 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9f74c07-2471-4208-bd31-22466baa1339 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
222822025-03-07T23:30:48.422ZINFOtest_unauthorized (external client test context): client received response status = 401
222832025-03-07T23:30:48.422ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
222842025-03-07T23:30:48.422ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
222852025-03-07T23:30:48.423ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 uri = /v1/vpcs/demo-vpc?project=demo-project
222862025-03-07T23:30:48.423ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 uri = /v1/vpcs/demo-vpc?project=demo-project
222872025-03-07T23:30:48.423ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs/demo-vpc?project=demo-project
222882025-03-07T23:30:48.423ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222892025-03-07T23:30:48.423ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222902025-03-07T23:30:48.424ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222912025-03-07T23:30:48.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222922025-03-07T23:30:48.426ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222932025-03-07T23:30:48.428ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222942025-03-07T23:30:48.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
222952025-03-07T23:30:48.430ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
222962025-03-07T23:30:48.430ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
222972025-03-07T23:30:48.430ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
222982025-03-07T23:30:48.431ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
222992025-03-07T23:30:48.433ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
223002025-03-07T23:30:48.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223012025-03-07T23:30:48.433ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223022025-03-07T23:30:48.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223032025-03-07T23:30:48.440ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
223042025-03-07T23:30:48.451ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
223052025-03-07T23:30:48.452ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223062025-03-07T23:30:48.452ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223072025-03-07T23:30:48.452ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223082025-03-07T23:30:48.455ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
223092025-03-07T23:30:48.455ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
223102025-03-07T23:30:48.455ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223112025-03-07T23:30:48.455ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223122025-03-07T23:30:48.456ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223132025-03-07T23:30:48.458ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
223142025-03-07T23:30:48.458ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223152025-03-07T23:30:48.458ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223162025-03-07T23:30:48.459ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223172025-03-07T23:30:48.462ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
223182025-03-07T23:30:48.466ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
223192025-03-07T23:30:48.466ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 uri = /v1/vpcs/demo-vpc?project=demo-project
223202025-03-07T23:30:48.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223212025-03-07T23:30:48.466ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223222025-03-07T23:30:48.467ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223232025-03-07T23:30:48.470ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223242025-03-07T23:30:48.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223252025-03-07T23:30:48.471ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223262025-03-07T23:30:48.473ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223272025-03-07T23:30:48.473ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223282025-03-07T23:30:48.473ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223292025-03-07T23:30:48.476ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
223302025-03-07T23:30:48.476ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
223312025-03-07T23:30:48.476ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223322025-03-07T23:30:48.476ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223332025-03-07T23:30:48.476ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223342025-03-07T23:30:48.480ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
223352025-03-07T23:30:48.480ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223362025-03-07T23:30:48.480ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223372025-03-07T23:30:48.481ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223382025-03-07T23:30:48.483ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
223392025-03-07T23:30:48.483ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
223402025-03-07T23:30:48.483ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223412025-03-07T23:30:48.484ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
223422025-03-07T23:30:48.489ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
223432025-03-07T23:30:48.525ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpcs/demo-vpc?project=demo-project
223442025-03-07T23:30:48.527ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 104424 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 904d72fe-961b-4fcc-8bfd-3d6cb23b0a79 response_code = 404 uri = /v1/vpcs/demo-vpc?project=demo-project
223452025-03-07T23:30:48.528ZINFOtest_unauthorized (external client test context): client received response status = 404
223462025-03-07T23:30:48.528ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
223472025-03-07T23:30:48.528ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223482025-03-07T23:30:48.529ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e89d1fce-7328-4522-9d40-4ee01d1816dd uri = /v1/vpcs/demo-vpc?project=demo-project
223492025-03-07T23:30:48.529ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e89d1fce-7328-4522-9d40-4ee01d1816dd uri = /v1/vpcs/demo-vpc?project=demo-project
223502025-03-07T23:30:48.529ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e89d1fce-7328-4522-9d40-4ee01d1816dd uri = /v1/vpcs/demo-vpc?project=demo-project
223512025-03-07T23:30:48.529ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e89d1fce-7328-4522-9d40-4ee01d1816dd uri = /v1/vpcs/demo-vpc?project=demo-project
223522025-03-07T23:30:48.529ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 360 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e89d1fce-7328-4522-9d40-4ee01d1816dd response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
223532025-03-07T23:30:48.529ZINFOtest_unauthorized (external client test context): client received response status = 401
223542025-03-07T23:30:48.529ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
223552025-03-07T23:30:48.529ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223562025-03-07T23:30:48.530ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7ac7edbe-8ddf-4db1-8350-561d2a69918a uri = /v1/vpcs/demo-vpc?project=demo-project
223572025-03-07T23:30:48.530ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7ac7edbe-8ddf-4db1-8350-561d2a69918a uri = /v1/vpcs/demo-vpc?project=demo-project
223582025-03-07T23:30:48.530ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7ac7edbe-8ddf-4db1-8350-561d2a69918a uri = /v1/vpcs/demo-vpc?project=demo-project
223592025-03-07T23:30:48.530ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 216 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7ac7edbe-8ddf-4db1-8350-561d2a69918a response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
223602025-03-07T23:30:48.530ZINFOtest_unauthorized (external client test context): client received response status = 401
223612025-03-07T23:30:48.530ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpcs/demo-vpc?project=demo-project
223622025-03-07T23:30:48.530ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223632025-03-07T23:30:48.531ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50617fc0-2213-45ac-9755-bbf0b90b202f uri = /v1/vpcs/demo-vpc?project=demo-project
223642025-03-07T23:30:48.531ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50617fc0-2213-45ac-9755-bbf0b90b202f uri = /v1/vpcs/demo-vpc?project=demo-project
223652025-03-07T23:30:48.533ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4996:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5009:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Vpc>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50617fc0-2213-45ac-9755-bbf0b90b202f uri = /v1/vpcs/demo-vpc?project=demo-project
223662025-03-07T23:30:48.534ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2805 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50617fc0-2213-45ac-9755-bbf0b90b202f response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
223672025-03-07T23:30:48.534ZINFOtest_unauthorized (external client test context): client received response status = 401
223682025-03-07T23:30:48.534ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpcs/demo-vpc?project=demo-project
223692025-03-07T23:30:48.534ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223702025-03-07T23:30:48.534ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 517fab2d-afca-4e12-9af3-4240a92d40fc uri = /v1/vpcs/demo-vpc?project=demo-project
223712025-03-07T23:30:48.535ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 232 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 517fab2d-afca-4e12-9af3-4240a92d40fc response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
223722025-03-07T23:30:48.535ZINFOtest_unauthorized (external client test context): client received response status = 405
223732025-03-07T23:30:48.535ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpcs/demo-vpc?project=demo-project
223742025-03-07T23:30:48.535ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223752025-03-07T23:30:48.536ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b04101ff-7885-4b71-b5d6-bfe6c0ce7188 uri = /v1/vpcs/demo-vpc?project=demo-project
223762025-03-07T23:30:48.536ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b04101ff-7885-4b71-b5d6-bfe6c0ce7188 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
223772025-03-07T23:30:48.536ZINFOtest_unauthorized (external client test context): client received response status = 405
223782025-03-07T23:30:48.536ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpcs/demo-vpc?project=demo-project
223792025-03-07T23:30:48.537ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223802025-03-07T23:30:48.537ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 723a6cb1-2a79-444a-ac6e-a15a67be39a9 uri = /v1/vpcs/demo-vpc?project=demo-project
223812025-03-07T23:30:48.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 723a6cb1-2a79-444a-ac6e-a15a67be39a9 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
223822025-03-07T23:30:48.537ZINFOtest_unauthorized (external client test context): client received response status = 405
223832025-03-07T23:30:48.537ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpcs/demo-vpc?project=demo-project
223842025-03-07T23:30:48.537ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223852025-03-07T23:30:48.537ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0198c881-38ce-40b9-9a84-cd3d2d40a74f uri = /v1/vpcs/demo-vpc?project=demo-project
223862025-03-07T23:30:48.537ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 194 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0198c881-38ce-40b9-9a84-cd3d2d40a74f response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
223872025-03-07T23:30:48.538ZINFOtest_unauthorized (external client test context): client received response status = 405
223882025-03-07T23:30:48.538ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
223892025-03-07T23:30:48.538ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
223902025-03-07T23:30:48.538ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 uri = /v1/vpcs/demo-vpc?project=demo-project
223912025-03-07T23:30:48.538ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 uri = /v1/vpcs/demo-vpc?project=demo-project
223922025-03-07T23:30:48.538ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpcs/demo-vpc?project=demo-project
223932025-03-07T23:30:48.538ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223942025-03-07T23:30:48.538ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223952025-03-07T23:30:48.540ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223962025-03-07T23:30:48.542ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
223972025-03-07T23:30:48.542ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
223982025-03-07T23:30:48.544ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
223992025-03-07T23:30:48.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
224002025-03-07T23:30:48.546ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
224012025-03-07T23:30:48.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224022025-03-07T23:30:48.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224032025-03-07T23:30:48.548ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224042025-03-07T23:30:48.555ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
224052025-03-07T23:30:48.555ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224062025-03-07T23:30:48.555ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224072025-03-07T23:30:48.559ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224082025-03-07T23:30:48.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
224092025-03-07T23:30:48.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
224102025-03-07T23:30:48.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
224112025-03-07T23:30:48.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
224122025-03-07T23:30:48.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224132025-03-07T23:30:48.568ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224142025-03-07T23:30:48.570ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224152025-03-07T23:30:48.572ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
224162025-03-07T23:30:48.573ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
224172025-03-07T23:30:48.573ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
224182025-03-07T23:30:48.573ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
224192025-03-07T23:30:48.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
224202025-03-07T23:30:48.573ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
224212025-03-07T23:30:48.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224222025-03-07T23:30:48.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224232025-03-07T23:30:48.574ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224242025-03-07T23:30:48.577ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
224252025-03-07T23:30:48.577ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
224262025-03-07T23:30:48.577ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
224272025-03-07T23:30:48.578ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
224282025-03-07T23:30:48.597ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
224292025-03-07T23:30:48.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
224302025-03-07T23:30:48.603ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 uri = /v1/vpcs/demo-vpc?project=demo-project
224312025-03-07T23:30:48.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
224322025-03-07T23:30:48.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224332025-03-07T23:30:48.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
224342025-03-07T23:30:48.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
224352025-03-07T23:30:48.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224362025-03-07T23:30:48.608ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
224372025-03-07T23:30:48.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
224382025-03-07T23:30:48.613ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224392025-03-07T23:30:48.614ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
224402025-03-07T23:30:48.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
224412025-03-07T23:30:48.617ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
224422025-03-07T23:30:48.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
224432025-03-07T23:30:48.617ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224442025-03-07T23:30:48.618ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
224452025-03-07T23:30:48.622ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
224462025-03-07T23:30:48.622ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
224472025-03-07T23:30:48.622ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224482025-03-07T23:30:48.623ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
224492025-03-07T23:30:48.627ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
224502025-03-07T23:30:48.627ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
224512025-03-07T23:30:48.627ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224522025-03-07T23:30:48.627ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
224532025-03-07T23:30:48.631ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
224542025-03-07T23:30:48.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpcs/demo-vpc?project=demo-project
224552025-03-07T23:30:48.646ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 108361 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5f932492-6565-47f9-b897-9292ee4fcb08 response_code = 404 uri = /v1/vpcs/demo-vpc?project=demo-project
224562025-03-07T23:30:48.647ZINFOtest_unauthorized (external client test context): client received response status = 404
224572025-03-07T23:30:48.647ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
224582025-03-07T23:30:48.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224592025-03-07T23:30:48.648ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d20ce15-cc01-4da2-b257-40f3537537cb uri = /v1/vpcs/demo-vpc?project=demo-project
224602025-03-07T23:30:48.648ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d20ce15-cc01-4da2-b257-40f3537537cb uri = /v1/vpcs/demo-vpc?project=demo-project
224612025-03-07T23:30:48.648ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d20ce15-cc01-4da2-b257-40f3537537cb uri = /v1/vpcs/demo-vpc?project=demo-project
224622025-03-07T23:30:48.648ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d20ce15-cc01-4da2-b257-40f3537537cb uri = /v1/vpcs/demo-vpc?project=demo-project
224632025-03-07T23:30:48.648ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 326 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d20ce15-cc01-4da2-b257-40f3537537cb response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
224642025-03-07T23:30:48.648ZINFOtest_unauthorized (external client test context): client received response status = 401
224652025-03-07T23:30:48.648ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
224662025-03-07T23:30:48.648ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224672025-03-07T23:30:48.648ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 410c3e7a-5a46-4b8f-8c1a-ffc4fcb14f32 uri = /v1/vpcs/demo-vpc?project=demo-project
224682025-03-07T23:30:48.649ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 410c3e7a-5a46-4b8f-8c1a-ffc4fcb14f32 uri = /v1/vpcs/demo-vpc?project=demo-project
224692025-03-07T23:30:48.649ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 410c3e7a-5a46-4b8f-8c1a-ffc4fcb14f32 uri = /v1/vpcs/demo-vpc?project=demo-project
224702025-03-07T23:30:48.649ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 275 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 410c3e7a-5a46-4b8f-8c1a-ffc4fcb14f32 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
224712025-03-07T23:30:48.653ZINFOtest_unauthorized (external client test context): client received response status = 401
224722025-03-07T23:30:48.653ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpcs/demo-vpc?project=demo-project
224732025-03-07T23:30:48.653ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224742025-03-07T23:30:48.653ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 160aa938-255e-46f6-bdbd-3d6019510656 uri = /v1/vpcs/demo-vpc?project=demo-project
224752025-03-07T23:30:48.653ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 160aa938-255e-46f6-bdbd-3d6019510656 uri = /v1/vpcs/demo-vpc?project=demo-project
224762025-03-07T23:30:48.655ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5023:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5034:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::VpcPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 160aa938-255e-46f6-bdbd-3d6019510656 uri = /v1/vpcs/demo-vpc?project=demo-project
224772025-03-07T23:30:48.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1210 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 160aa938-255e-46f6-bdbd-3d6019510656 response_code = 401 uri = /v1/vpcs/demo-vpc?project=demo-project
224782025-03-07T23:30:48.655ZINFOtest_unauthorized (external client test context): client received response status = 401
224792025-03-07T23:30:48.655ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
224802025-03-07T23:30:48.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224812025-03-07T23:30:48.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 87d6f7bd-6c9c-4bd8-be06-e13e3d25687c uri = /v1/vpcs/demo-vpc?project=demo-project
224822025-03-07T23:30:48.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 87d6f7bd-6c9c-4bd8-be06-e13e3d25687c response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
224832025-03-07T23:30:48.655ZINFOtest_unauthorized (external client test context): client received response status = 405
224842025-03-07T23:30:48.655ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
224852025-03-07T23:30:48.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224862025-03-07T23:30:48.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 07b9b7f6-25dc-4483-82e4-7942bc88d199 uri = /v1/vpcs/demo-vpc?project=demo-project
224872025-03-07T23:30:48.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 07b9b7f6-25dc-4483-82e4-7942bc88d199 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
224882025-03-07T23:30:48.655ZINFOtest_unauthorized (external client test context): client received response status = 405
224892025-03-07T23:30:48.656ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
224902025-03-07T23:30:48.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224912025-03-07T23:30:48.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d94a42f6-07be-4e2c-9d8e-22887db40ae4 uri = /v1/vpcs/demo-vpc?project=demo-project
224922025-03-07T23:30:48.656ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d94a42f6-07be-4e2c-9d8e-22887db40ae4 response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
224932025-03-07T23:30:48.656ZINFOtest_unauthorized (external client test context): client received response status = 405
224942025-03-07T23:30:48.656ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpcs/demo-vpc?project=demo-project
224952025-03-07T23:30:48.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
224962025-03-07T23:30:48.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a8dfb82c-5792-4e67-9f33-cfa0c91cdefa uri = /v1/vpcs/demo-vpc?project=demo-project
224972025-03-07T23:30:48.656ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a8dfb82c-5792-4e67-9f33-cfa0c91cdefa response_code = 405 uri = /v1/vpcs/demo-vpc?project=demo-project
224982025-03-07T23:30:48.656ZINFOtest_unauthorized (external client test context): client received response status = 405
224992025-03-07T23:30:48.656ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpcs/demo-vpc?project=demo-project
225002025-03-07T23:30:48.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpcs/demo-vpc?project=demo-project
225012025-03-07T23:30:48.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 uri = /v1/vpcs/demo-vpc?project=demo-project
225022025-03-07T23:30:48.657ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 uri = /v1/vpcs/demo-vpc?project=demo-project
225032025-03-07T23:30:48.657ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs/demo-vpc?project=demo-project
225042025-03-07T23:30:48.657ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225052025-03-07T23:30:48.657ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225062025-03-07T23:30:48.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225072025-03-07T23:30:48.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225082025-03-07T23:30:48.661ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225092025-03-07T23:30:48.662ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225102025-03-07T23:30:48.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
225112025-03-07T23:30:48.685ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
225122025-03-07T23:30:48.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225132025-03-07T23:30:48.685ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225142025-03-07T23:30:48.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225152025-03-07T23:30:48.698ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
225162025-03-07T23:30:48.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225172025-03-07T23:30:48.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225182025-03-07T23:30:48.699ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225192025-03-07T23:30:48.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
225202025-03-07T23:30:48.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
225212025-03-07T23:30:48.708ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225222025-03-07T23:30:48.708ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225232025-03-07T23:30:48.709ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225242025-03-07T23:30:48.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
225252025-03-07T23:30:48.713ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
225262025-03-07T23:30:48.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225272025-03-07T23:30:48.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225282025-03-07T23:30:48.714ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225292025-03-07T23:30:48.716ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
225302025-03-07T23:30:48.716ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225312025-03-07T23:30:48.716ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225322025-03-07T23:30:48.717ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225332025-03-07T23:30:48.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
225342025-03-07T23:30:48.723ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
225352025-03-07T23:30:48.723ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 uri = /v1/vpcs/demo-vpc?project=demo-project
225362025-03-07T23:30:48.723ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
225372025-03-07T23:30:48.723ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
225382025-03-07T23:30:48.724ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225392025-03-07T23:30:48.726ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
225402025-03-07T23:30:48.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
225412025-03-07T23:30:48.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225422025-03-07T23:30:48.729ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
225432025-03-07T23:30:48.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
225442025-03-07T23:30:48.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225452025-03-07T23:30:48.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpcs/demo-vpc?project=demo-project
225462025-03-07T23:30:48.732ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpcs/demo-vpc?project=demo-project
225472025-03-07T23:30:48.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
225482025-03-07T23:30:48.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
225492025-03-07T23:30:48.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225502025-03-07T23:30:48.737ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpcs/demo-vpc?project=demo-project
225512025-03-07T23:30:48.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
225522025-03-07T23:30:48.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
225532025-03-07T23:30:48.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225542025-03-07T23:30:48.745ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpcs/demo-vpc?project=demo-project
225552025-03-07T23:30:48.745ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database uri = /v1/vpcs/demo-vpc?project=demo-project
225562025-03-07T23:30:48.746ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {} } uri = /v1/vpcs/demo-vpc?project=demo-project
225572025-03-07T23:30:48.746ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Database result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225582025-03-07T23:30:48.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpcs/demo-vpc?project=demo-project
225592025-03-07T23:30:48.765ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpcs/demo-vpc?project=demo-project
225602025-03-07T23:30:48.765ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 108596 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9d94e2da-30ff-4fc8-acd4-243e4263a587 response_code = 200 uri = /v1/vpcs/demo-vpc?project=demo-project
225612025-03-07T23:30:48.766ZINFOtest_unauthorized (external client test context): client received response status = 200
225622025-03-07T23:30:48.766ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225632025-03-07T23:30:48.767ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225642025-03-07T23:30:48.767ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225652025-03-07T23:30:48.771ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225662025-03-07T23:30:48.773ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225672025-03-07T23:30:48.773ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
225682025-03-07T23:30:48.773ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225692025-03-07T23:30:48.773ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225702025-03-07T23:30:48.773ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225712025-03-07T23:30:48.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225722025-03-07T23:30:48.779ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225732025-03-07T23:30:48.780ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225742025-03-07T23:30:48.787ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
225752025-03-07T23:30:48.787ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
225762025-03-07T23:30:48.787ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225772025-03-07T23:30:48.788ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225782025-03-07T23:30:48.788ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225792025-03-07T23:30:48.797ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
225802025-03-07T23:30:48.797ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225812025-03-07T23:30:48.797ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225822025-03-07T23:30:48.798ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225832025-03-07T23:30:48.802ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
225842025-03-07T23:30:48.807ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
225852025-03-07T23:30:48.807ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225862025-03-07T23:30:48.807ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225872025-03-07T23:30:48.808ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225882025-03-07T23:30:48.815ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
225892025-03-07T23:30:48.815ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
225902025-03-07T23:30:48.815ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225912025-03-07T23:30:48.815ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225922025-03-07T23:30:48.815ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225932025-03-07T23:30:48.817ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
225942025-03-07T23:30:48.818ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
225952025-03-07T23:30:48.818ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
225962025-03-07T23:30:48.818ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
225972025-03-07T23:30:48.821ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
225982025-03-07T23:30:48.824ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
225992025-03-07T23:30:48.824ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226002025-03-07T23:30:48.825ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226012025-03-07T23:30:48.825ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226022025-03-07T23:30:48.826ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226032025-03-07T23:30:48.835ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226042025-03-07T23:30:48.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226052025-03-07T23:30:48.839ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226062025-03-07T23:30:48.839ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226072025-03-07T23:30:48.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226082025-03-07T23:30:48.840ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226092025-03-07T23:30:48.842ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226102025-03-07T23:30:48.842ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226112025-03-07T23:30:48.843ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226122025-03-07T23:30:48.843ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226132025-03-07T23:30:48.843ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226142025-03-07T23:30:48.849ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226152025-03-07T23:30:48.849ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226162025-03-07T23:30:48.849ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226172025-03-07T23:30:48.849ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226182025-03-07T23:30:48.860ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226192025-03-07T23:30:48.862ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226202025-03-07T23:30:48.862ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226212025-03-07T23:30:48.864ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226222025-03-07T23:30:48.873ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226232025-03-07T23:30:48.885ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226242025-03-07T23:30:48.886ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226252025-03-07T23:30:48.886ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226262025-03-07T23:30:48.886ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226272025-03-07T23:30:48.886ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226282025-03-07T23:30:48.887ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226292025-03-07T23:30:48.896ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226302025-03-07T23:30:48.899ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226312025-03-07T23:30:48.901ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226322025-03-07T23:30:48.902ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226332025-03-07T23:30:48.907ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226342025-03-07T23:30:48.907ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226352025-03-07T23:30:48.907ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226362025-03-07T23:30:48.908ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226372025-03-07T23:30:48.928ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226382025-03-07T23:30:48.942ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226392025-03-07T23:30:48.942ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226402025-03-07T23:30:48.943ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226412025-03-07T23:30:48.943ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226422025-03-07T23:30:48.949ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 177828 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c03aedff-fb06-47cd-badd-efe2d6e102c1 response_code = 200 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226432025-03-07T23:30:48.950ZINFOtest_unauthorized (external client test context): client received response status = 200
226442025-03-07T23:30:48.950ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226452025-03-07T23:30:48.950ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226462025-03-07T23:30:48.951ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226472025-03-07T23:30:48.951ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226482025-03-07T23:30:48.951ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226492025-03-07T23:30:48.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226502025-03-07T23:30:48.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226512025-03-07T23:30:48.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226522025-03-07T23:30:48.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226532025-03-07T23:30:48.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226542025-03-07T23:30:48.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226552025-03-07T23:30:48.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
226562025-03-07T23:30:48.958ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
226572025-03-07T23:30:48.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226582025-03-07T23:30:48.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226592025-03-07T23:30:48.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226602025-03-07T23:30:48.963ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
226612025-03-07T23:30:48.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226622025-03-07T23:30:48.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226632025-03-07T23:30:48.964ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226642025-03-07T23:30:48.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
226652025-03-07T23:30:48.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
226662025-03-07T23:30:48.971ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226672025-03-07T23:30:48.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226682025-03-07T23:30:48.973ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226692025-03-07T23:30:48.987ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
226702025-03-07T23:30:48.987ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
226712025-03-07T23:30:48.987ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226722025-03-07T23:30:48.987ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226732025-03-07T23:30:48.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226742025-03-07T23:30:48.993ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
226752025-03-07T23:30:48.993ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
226762025-03-07T23:30:48.993ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
226772025-03-07T23:30:48.995ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
226782025-03-07T23:30:49.002ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
226792025-03-07T23:30:49.004ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
226802025-03-07T23:30:49.004ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226812025-03-07T23:30:49.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226822025-03-07T23:30:49.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226832025-03-07T23:30:49.005ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226842025-03-07T23:30:49.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226852025-03-07T23:30:49.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226862025-03-07T23:30:49.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226872025-03-07T23:30:49.013ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226882025-03-07T23:30:49.013ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226892025-03-07T23:30:49.013ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226902025-03-07T23:30:49.015ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226912025-03-07T23:30:49.016ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226922025-03-07T23:30:49.016ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226932025-03-07T23:30:49.016ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226942025-03-07T23:30:49.016ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226952025-03-07T23:30:49.024ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226962025-03-07T23:30:49.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226972025-03-07T23:30:49.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226982025-03-07T23:30:49.027ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
226992025-03-07T23:30:49.029ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227002025-03-07T23:30:49.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227012025-03-07T23:30:49.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227022025-03-07T23:30:49.030ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227032025-03-07T23:30:49.033ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227042025-03-07T23:30:49.046ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227052025-03-07T23:30:49.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 95899 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a992d966-54f6-4cd8-bf1b-ea56b87173dc response_code = 404 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227062025-03-07T23:30:49.046ZINFOtest_unauthorized (external client test context): client received response status = 404
227072025-03-07T23:30:49.047ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227082025-03-07T23:30:49.047ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227092025-03-07T23:30:49.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02e102f9-e4e8-41e1-9014-881c7ea49970 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227102025-03-07T23:30:49.047ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02e102f9-e4e8-41e1-9014-881c7ea49970 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227112025-03-07T23:30:49.047ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02e102f9-e4e8-41e1-9014-881c7ea49970 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227122025-03-07T23:30:49.047ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02e102f9-e4e8-41e1-9014-881c7ea49970 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227132025-03-07T23:30:49.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 330 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02e102f9-e4e8-41e1-9014-881c7ea49970 response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227142025-03-07T23:30:49.047ZINFOtest_unauthorized (external client test context): client received response status = 401
227152025-03-07T23:30:49.047ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227162025-03-07T23:30:49.047ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227172025-03-07T23:30:49.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e519be2-b441-4b23-91dc-1e329b767760 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227182025-03-07T23:30:49.048ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e519be2-b441-4b23-91dc-1e329b767760 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227192025-03-07T23:30:49.048ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e519be2-b441-4b23-91dc-1e329b767760 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227202025-03-07T23:30:49.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 163 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e519be2-b441-4b23-91dc-1e329b767760 response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227212025-03-07T23:30:49.048ZINFOtest_unauthorized (external client test context): client received response status = 401
227222025-03-07T23:30:49.048ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227232025-03-07T23:30:49.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227242025-03-07T23:30:49.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1dc958fd-be36-4227-ad29-786ce4a994ed uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227252025-03-07T23:30:49.048ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1dc958fd-be36-4227-ad29-786ce4a994ed uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227262025-03-07T23:30:49.050ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5249:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5263:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1dc958fd-be36-4227-ad29-786ce4a994ed uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227272025-03-07T23:30:49.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1139 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1dc958fd-be36-4227-ad29-786ce4a994ed response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227282025-03-07T23:30:49.050ZINFOtest_unauthorized (external client test context): client received response status = 401
227292025-03-07T23:30:49.050ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227302025-03-07T23:30:49.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227312025-03-07T23:30:49.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227322025-03-07T23:30:49.050ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227332025-03-07T23:30:49.050ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227342025-03-07T23:30:49.050ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227352025-03-07T23:30:49.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227362025-03-07T23:30:49.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227372025-03-07T23:30:49.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227382025-03-07T23:30:49.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227392025-03-07T23:30:49.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227402025-03-07T23:30:49.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
227412025-03-07T23:30:49.061ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
227422025-03-07T23:30:49.061ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227432025-03-07T23:30:49.061ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227442025-03-07T23:30:49.062ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227452025-03-07T23:30:49.070ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
227462025-03-07T23:30:49.070ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227472025-03-07T23:30:49.070ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227482025-03-07T23:30:49.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227492025-03-07T23:30:49.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
227502025-03-07T23:30:49.078ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
227512025-03-07T23:30:49.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227522025-03-07T23:30:49.078ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227532025-03-07T23:30:49.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227542025-03-07T23:30:49.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
227552025-03-07T23:30:49.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
227562025-03-07T23:30:49.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227572025-03-07T23:30:49.081ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227582025-03-07T23:30:49.082ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227592025-03-07T23:30:49.097ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
227602025-03-07T23:30:49.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
227612025-03-07T23:30:49.097ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
227622025-03-07T23:30:49.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
227632025-03-07T23:30:49.100ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
227642025-03-07T23:30:49.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
227652025-03-07T23:30:49.104ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227662025-03-07T23:30:49.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227672025-03-07T23:30:49.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227682025-03-07T23:30:49.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227692025-03-07T23:30:49.107ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227702025-03-07T23:30:49.108ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227712025-03-07T23:30:49.109ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227722025-03-07T23:30:49.112ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227732025-03-07T23:30:49.112ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227742025-03-07T23:30:49.117ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227752025-03-07T23:30:49.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227762025-03-07T23:30:49.121ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227772025-03-07T23:30:49.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227782025-03-07T23:30:49.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227792025-03-07T23:30:49.122ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227802025-03-07T23:30:49.125ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227812025-03-07T23:30:49.125ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227822025-03-07T23:30:49.125ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227832025-03-07T23:30:49.126ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227842025-03-07T23:30:49.130ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227852025-03-07T23:30:49.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227862025-03-07T23:30:49.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227872025-03-07T23:30:49.130ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227882025-03-07T23:30:49.134ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227892025-03-07T23:30:49.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227902025-03-07T23:30:49.160ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 109791 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 61a8bca3-4886-4257-87a6-2b9fe02c006f response_code = 404 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227912025-03-07T23:30:49.160ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
227922025-03-07T23:30:49.160ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
227932025-03-07T23:30:49.161ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
227942025-03-07T23:30:49.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
227952025-03-07T23:30:49.163ZINFOtest_unauthorized (external client test context): client received response status = 404
227962025-03-07T23:30:49.163ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227972025-03-07T23:30:49.163ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227982025-03-07T23:30:49.163ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3386861-360f-4290-b62d-22c5c5ebe4ee uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
227992025-03-07T23:30:49.163ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3386861-360f-4290-b62d-22c5c5ebe4ee uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228002025-03-07T23:30:49.163ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3386861-360f-4290-b62d-22c5c5ebe4ee uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228012025-03-07T23:30:49.163ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3386861-360f-4290-b62d-22c5c5ebe4ee uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228022025-03-07T23:30:49.163ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 379 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3386861-360f-4290-b62d-22c5c5ebe4ee response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228032025-03-07T23:30:49.163ZINFOtest_unauthorized (external client test context): client received response status = 401
228042025-03-07T23:30:49.164ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228052025-03-07T23:30:49.164ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228062025-03-07T23:30:49.164ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aa8736d0-7b0e-41af-8066-1920fe059f7e uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228072025-03-07T23:30:49.164ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aa8736d0-7b0e-41af-8066-1920fe059f7e uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228082025-03-07T23:30:49.164ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aa8736d0-7b0e-41af-8066-1920fe059f7e uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228092025-03-07T23:30:49.164ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 258 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aa8736d0-7b0e-41af-8066-1920fe059f7e response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228102025-03-07T23:30:49.164ZINFOtest_unauthorized (external client test context): client received response status = 401
228112025-03-07T23:30:49.164ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228122025-03-07T23:30:49.164ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228132025-03-07T23:30:49.164ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b665573f-0e67-42ad-82e0-707aaed7ae45 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228142025-03-07T23:30:49.164ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b665573f-0e67-42ad-82e0-707aaed7ae45 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228152025-03-07T23:30:49.166ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5279:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5295:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_firewall_rules_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<omicron_common::api::external::VpcFirewallRuleUpdateParams>), dropshot::handler::HttpResponseOk<omicron_common::api::external::VpcFirewallRules>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b665573f-0e67-42ad-82e0-707aaed7ae45 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228162025-03-07T23:30:49.166ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1554 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b665573f-0e67-42ad-82e0-707aaed7ae45 response_code = 401 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228172025-03-07T23:30:49.166ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
228182025-03-07T23:30:49.166ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
228192025-03-07T23:30:49.166ZINFOtest_unauthorized (external client test context): client received response status = 401
228202025-03-07T23:30:49.166ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228212025-03-07T23:30:49.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228222025-03-07T23:30:49.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9a701064-d9ce-41ec-9d47-8c91e458ab3e uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228232025-03-07T23:30:49.166ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9a701064-d9ce-41ec-9d47-8c91e458ab3e response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228242025-03-07T23:30:49.167ZINFOtest_unauthorized (external client test context): client received response status = 405
228252025-03-07T23:30:49.167ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228262025-03-07T23:30:49.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228272025-03-07T23:30:49.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f331f74e-b08e-4a6f-b265-00adbc0be19b uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228282025-03-07T23:30:49.167ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f331f74e-b08e-4a6f-b265-00adbc0be19b response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228292025-03-07T23:30:49.167ZINFOtest_unauthorized (external client test context): client received response status = 405
228302025-03-07T23:30:49.167ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228312025-03-07T23:30:49.167ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228322025-03-07T23:30:49.167ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a602aff3-8b6d-4824-906e-abc8d16c5a69 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228332025-03-07T23:30:49.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a602aff3-8b6d-4824-906e-abc8d16c5a69 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228342025-03-07T23:30:49.168ZINFOtest_unauthorized (external client test context): client received response status = 405
228352025-03-07T23:30:49.168ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228362025-03-07T23:30:49.168ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228372025-03-07T23:30:49.168ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1941a8ce-4470-4045-8d96-276744423dac uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228382025-03-07T23:30:49.168ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1941a8ce-4470-4045-8d96-276744423dac response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228392025-03-07T23:30:49.168ZINFOtest_unauthorized (external client test context): client received response status = 405
228402025-03-07T23:30:49.169ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228412025-03-07T23:30:49.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228422025-03-07T23:30:49.169ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c4cb7cd-9382-471a-9532-f3ef1956a707 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228432025-03-07T23:30:49.169ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c4cb7cd-9382-471a-9532-f3ef1956a707 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228442025-03-07T23:30:49.169ZINFOtest_unauthorized (external client test context): client received response status = 405
228452025-03-07T23:30:49.169ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228462025-03-07T23:30:49.169ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228472025-03-07T23:30:49.170ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ed4f3593-9389-4489-b25e-142d3381739d uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228482025-03-07T23:30:49.170ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ed4f3593-9389-4489-b25e-142d3381739d response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228492025-03-07T23:30:49.170ZINFOtest_unauthorized (external client test context): client received response status = 405
228502025-03-07T23:30:49.170ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228512025-03-07T23:30:49.170ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228522025-03-07T23:30:49.170ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
228532025-03-07T23:30:49.170ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
228542025-03-07T23:30:49.171ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 601fd533-22dd-44b6-843b-4bf378e2613e uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228552025-03-07T23:30:49.171ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 95 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 601fd533-22dd-44b6-843b-4bf378e2613e response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228562025-03-07T23:30:49.171ZINFOtest_unauthorized (external client test context): client received response status = 405
228572025-03-07T23:30:49.171ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228582025-03-07T23:30:49.171ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228592025-03-07T23:30:49.171ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 68ee1b9d-984f-4dca-8f1c-9ea8a625fccd uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228602025-03-07T23:30:49.171ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 68ee1b9d-984f-4dca-8f1c-9ea8a625fccd response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228612025-03-07T23:30:49.171ZINFOtest_unauthorized (external client test context): client received response status = 405
228622025-03-07T23:30:49.171ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228632025-03-07T23:30:49.171ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228642025-03-07T23:30:49.172ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70938f49-e902-4d91-8d45-2ed760df1396 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228652025-03-07T23:30:49.172ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 70938f49-e902-4d91-8d45-2ed760df1396 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228662025-03-07T23:30:49.172ZINFOtest_unauthorized (external client test context): client received response status = 405
228672025-03-07T23:30:49.172ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228682025-03-07T23:30:49.172ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228692025-03-07T23:30:49.172ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6c298ca9-73e9-48cd-a6ba-4268bb0ac682 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228702025-03-07T23:30:49.172ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6c298ca9-73e9-48cd-a6ba-4268bb0ac682 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228712025-03-07T23:30:49.173ZINFOtest_unauthorized (external client test context): client received response status = 405
228722025-03-07T23:30:49.173ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228732025-03-07T23:30:49.173ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228742025-03-07T23:30:49.173ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 94454e7e-68d4-4cfa-80be-b5619f76555a uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228752025-03-07T23:30:49.173ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 94454e7e-68d4-4cfa-80be-b5619f76555a response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228762025-03-07T23:30:49.173ZINFOtest_unauthorized (external client test context): client received response status = 405
228772025-03-07T23:30:49.173ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228782025-03-07T23:30:49.173ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228792025-03-07T23:30:49.173ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 475894f6-1658-4c64-b902-e4b9857afd46 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228802025-03-07T23:30:49.173ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 159 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 475894f6-1658-4c64-b902-e4b9857afd46 response_code = 405 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228812025-03-07T23:30:49.174ZINFOtest_unauthorized (external client test context): client received response status = 405
228822025-03-07T23:30:49.174ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228832025-03-07T23:30:49.174ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228842025-03-07T23:30:49.174ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228852025-03-07T23:30:49.174ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228862025-03-07T23:30:49.174ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
228872025-03-07T23:30:49.174ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228882025-03-07T23:30:49.174ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228892025-03-07T23:30:49.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228902025-03-07T23:30:49.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228912025-03-07T23:30:49.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228922025-03-07T23:30:49.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228932025-03-07T23:30:49.182ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
228942025-03-07T23:30:49.182ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
228952025-03-07T23:30:49.182ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
228962025-03-07T23:30:49.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
228972025-03-07T23:30:49.183ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
228982025-03-07T23:30:49.186ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
228992025-03-07T23:30:49.186ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229002025-03-07T23:30:49.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229012025-03-07T23:30:49.187ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229022025-03-07T23:30:49.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
229032025-03-07T23:30:49.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
229042025-03-07T23:30:49.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229052025-03-07T23:30:49.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229062025-03-07T23:30:49.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229072025-03-07T23:30:49.203ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
229082025-03-07T23:30:49.204ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
229092025-03-07T23:30:49.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229102025-03-07T23:30:49.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229112025-03-07T23:30:49.205ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229122025-03-07T23:30:49.207ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
229132025-03-07T23:30:49.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229142025-03-07T23:30:49.207ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229152025-03-07T23:30:49.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229162025-03-07T23:30:49.210ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
229172025-03-07T23:30:49.214ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
229182025-03-07T23:30:49.214ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229192025-03-07T23:30:49.214ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229202025-03-07T23:30:49.214ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229212025-03-07T23:30:49.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229222025-03-07T23:30:49.228ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229232025-03-07T23:30:49.228ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229242025-03-07T23:30:49.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229252025-03-07T23:30:49.232ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229262025-03-07T23:30:49.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229272025-03-07T23:30:49.234ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229282025-03-07T23:30:49.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229292025-03-07T23:30:49.237ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229302025-03-07T23:30:49.237ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229312025-03-07T23:30:49.237ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229322025-03-07T23:30:49.240ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229332025-03-07T23:30:49.246ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229342025-03-07T23:30:49.246ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229352025-03-07T23:30:49.246ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229362025-03-07T23:30:49.248ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229372025-03-07T23:30:49.252ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229382025-03-07T23:30:49.252ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229392025-03-07T23:30:49.252ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229402025-03-07T23:30:49.253ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229412025-03-07T23:30:49.258ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229422025-03-07T23:30:49.278ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229432025-03-07T23:30:49.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229442025-03-07T23:30:49.279ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229452025-03-07T23:30:49.279ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229462025-03-07T23:30:49.279ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229472025-03-07T23:30:49.280ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229482025-03-07T23:30:49.283ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
229492025-03-07T23:30:49.286ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229502025-03-07T23:30:49.286ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229512025-03-07T23:30:49.286ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229522025-03-07T23:30:49.287ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229532025-03-07T23:30:49.293ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229542025-03-07T23:30:49.293ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229552025-03-07T23:30:49.293ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229562025-03-07T23:30:49.294ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229572025-03-07T23:30:49.300ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229582025-03-07T23:30:49.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229592025-03-07T23:30:49.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229602025-03-07T23:30:49.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b roles = RoleSet { roles: {} } uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229612025-03-07T23:30:49.339ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b resource = Database result = Ok(()) uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229622025-03-07T23:30:49.344ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 169867 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d8033757-b85c-46ba-b698-c608350aca1b response_code = 200 uri = /v1/vpc-firewall-rules?project=demo-project&vpc=demo-vpc
229632025-03-07T23:30:49.344ZINFOtest_unauthorized (external client test context): client received response status = 200
229642025-03-07T23:30:49.345ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229652025-03-07T23:30:49.345ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229662025-03-07T23:30:49.345ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229672025-03-07T23:30:49.346ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229682025-03-07T23:30:49.346ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229692025-03-07T23:30:49.347ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
229702025-03-07T23:30:49.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229712025-03-07T23:30:49.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229722025-03-07T23:30:49.348ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229732025-03-07T23:30:49.357ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229742025-03-07T23:30:49.357ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229752025-03-07T23:30:49.358ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229762025-03-07T23:30:49.361ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
229772025-03-07T23:30:49.361ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
229782025-03-07T23:30:49.361ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229792025-03-07T23:30:49.361ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229802025-03-07T23:30:49.363ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229812025-03-07T23:30:49.368ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
229822025-03-07T23:30:49.368ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229832025-03-07T23:30:49.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229842025-03-07T23:30:49.369ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229852025-03-07T23:30:49.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
229862025-03-07T23:30:49.379ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
229872025-03-07T23:30:49.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229882025-03-07T23:30:49.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229892025-03-07T23:30:49.380ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229902025-03-07T23:30:49.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
229912025-03-07T23:30:49.382ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
229922025-03-07T23:30:49.383ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229932025-03-07T23:30:49.383ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229942025-03-07T23:30:49.383ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229952025-03-07T23:30:49.387ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
229962025-03-07T23:30:49.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
229972025-03-07T23:30:49.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
229982025-03-07T23:30:49.388ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
229992025-03-07T23:30:49.394ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
230002025-03-07T23:30:49.399ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
230012025-03-07T23:30:49.399ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230022025-03-07T23:30:49.399ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230032025-03-07T23:30:49.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230042025-03-07T23:30:49.400ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230052025-03-07T23:30:49.415ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
230062025-03-07T23:30:49.416ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
230072025-03-07T23:30:49.416ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0f0c657a-0f3a-48dc-9bfd-7bd76f9c6248 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
230082025-03-07T23:30:49.417ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0f0c657a-0f3a-48dc-9bfd-7bd76f9c6248 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
230092025-03-07T23:30:49.417ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0f0c657a-0f3a-48dc-9bfd-7bd76f9c6248 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
230102025-03-07T23:30:49.418ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0f0c657a-0f3a-48dc-9bfd-7bd76f9c6248 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
230112025-03-07T23:30:49.418ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230122025-03-07T23:30:49.418ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230132025-03-07T23:30:49.419ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230142025-03-07T23:30:49.422ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 5483 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 0f0c657a-0f3a-48dc-9bfd-7bd76f9c6248 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
230152025-03-07T23:30:49.422ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0f0c657a-0f3a-48dc-9bfd-7bd76f9c6248", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:48 GMT"} })
230162025-03-07T23:30:49.422ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
230172025-03-07T23:30:49.423ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e59ad4a7-bfba-40c9-b465-bdc23c0c5b9e uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
230182025-03-07T23:30:49.423ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e59ad4a7-bfba-40c9-b465-bdc23c0c5b9e resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
230192025-03-07T23:30:49.423ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e59ad4a7-bfba-40c9-b465-bdc23c0c5b9e roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
230202025-03-07T23:30:49.424ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e59ad4a7-bfba-40c9-b465-bdc23c0c5b9e resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
230212025-03-07T23:30:49.432ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230222025-03-07T23:30:49.432ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230232025-03-07T23:30:49.437ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230242025-03-07T23:30:49.439ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 16346 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = e59ad4a7-bfba-40c9-b465-bdc23c0c5b9e response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
230252025-03-07T23:30:49.439ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e59ad4a7-bfba-40c9-b465-bdc23c0c5b9e", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:48 GMT"} })
230262025-03-07T23:30:49.443ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
230272025-03-07T23:30:49.443ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230282025-03-07T23:30:49.443ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
230292025-03-07T23:30:49.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230302025-03-07T23:30:49.448ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230312025-03-07T23:30:49.449ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230322025-03-07T23:30:49.449ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230332025-03-07T23:30:49.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230342025-03-07T23:30:49.455ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230352025-03-07T23:30:49.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230362025-03-07T23:30:49.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230372025-03-07T23:30:49.456ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230382025-03-07T23:30:49.464ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230392025-03-07T23:30:49.464ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230402025-03-07T23:30:49.464ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230412025-03-07T23:30:49.466ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230422025-03-07T23:30:49.469ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230432025-03-07T23:30:49.479ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230442025-03-07T23:30:49.479ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230452025-03-07T23:30:49.479ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230462025-03-07T23:30:49.479ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230472025-03-07T23:30:49.480ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230482025-03-07T23:30:49.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230492025-03-07T23:30:49.502ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230502025-03-07T23:30:49.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230512025-03-07T23:30:49.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230522025-03-07T23:30:49.502ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230532025-03-07T23:30:49.505ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230542025-03-07T23:30:49.505ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230552025-03-07T23:30:49.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230562025-03-07T23:30:49.508ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230572025-03-07T23:30:49.513ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230582025-03-07T23:30:49.531ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230592025-03-07T23:30:49.531ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230602025-03-07T23:30:49.531ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230612025-03-07T23:30:49.532ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230622025-03-07T23:30:49.541ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 194831 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 53d2aa1c-3dcb-4912-9119-52c583e2bff7 response_code = 200 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230632025-03-07T23:30:49.541ZINFOtest_unauthorized (external client test context): client received response status = 200
230642025-03-07T23:30:49.541ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230652025-03-07T23:30:49.541ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230662025-03-07T23:30:49.542ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230672025-03-07T23:30:49.542ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230682025-03-07T23:30:49.542ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
230692025-03-07T23:30:49.542ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230702025-03-07T23:30:49.542ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230712025-03-07T23:30:49.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230722025-03-07T23:30:49.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230732025-03-07T23:30:49.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230742025-03-07T23:30:49.547ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230752025-03-07T23:30:49.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
230762025-03-07T23:30:49.551ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
230772025-03-07T23:30:49.551ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230782025-03-07T23:30:49.551ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230792025-03-07T23:30:49.552ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230802025-03-07T23:30:49.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230812025-03-07T23:30:49.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230822025-03-07T23:30:49.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
230832025-03-07T23:30:49.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230842025-03-07T23:30:49.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230852025-03-07T23:30:49.567ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230862025-03-07T23:30:49.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
230872025-03-07T23:30:49.574ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
230882025-03-07T23:30:49.574ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230892025-03-07T23:30:49.574ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230902025-03-07T23:30:49.575ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
230912025-03-07T23:30:49.576ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230922025-03-07T23:30:49.577ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230932025-03-07T23:30:49.577ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230942025-03-07T23:30:49.577ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
230952025-03-07T23:30:49.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
230962025-03-07T23:30:49.578ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
230972025-03-07T23:30:49.578ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
230982025-03-07T23:30:49.578ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
230992025-03-07T23:30:49.578ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231002025-03-07T23:30:49.582ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
231012025-03-07T23:30:49.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231022025-03-07T23:30:49.582ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231032025-03-07T23:30:49.582ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231042025-03-07T23:30:49.587ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
231052025-03-07T23:30:49.594ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
231062025-03-07T23:30:49.594ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231072025-03-07T23:30:49.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231082025-03-07T23:30:49.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231092025-03-07T23:30:49.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231102025-03-07T23:30:49.599ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231112025-03-07T23:30:49.599ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231122025-03-07T23:30:49.599ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231132025-03-07T23:30:49.605ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231142025-03-07T23:30:49.605ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231152025-03-07T23:30:49.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231162025-03-07T23:30:49.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231172025-03-07T23:30:49.612ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231182025-03-07T23:30:49.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231192025-03-07T23:30:49.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231202025-03-07T23:30:49.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231212025-03-07T23:30:49.616ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231222025-03-07T23:30:49.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231232025-03-07T23:30:49.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231242025-03-07T23:30:49.616ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231252025-03-07T23:30:49.622ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231262025-03-07T23:30:49.622ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231272025-03-07T23:30:49.622ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231282025-03-07T23:30:49.623ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231292025-03-07T23:30:49.630ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231302025-03-07T23:30:49.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231312025-03-07T23:30:49.665ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 123854 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d2e268a5-7046-40af-a599-2caa7d487f0f response_code = 404 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231322025-03-07T23:30:49.666ZINFOtest_unauthorized (external client test context): client received response status = 404
231332025-03-07T23:30:49.666ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231342025-03-07T23:30:49.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231352025-03-07T23:30:49.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bf2432f-c5d7-4d60-a030-facb356a6dd6 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231362025-03-07T23:30:49.667ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bf2432f-c5d7-4d60-a030-facb356a6dd6 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231372025-03-07T23:30:49.667ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bf2432f-c5d7-4d60-a030-facb356a6dd6 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231382025-03-07T23:30:49.667ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bf2432f-c5d7-4d60-a030-facb356a6dd6 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231392025-03-07T23:30:49.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 669 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bf2432f-c5d7-4d60-a030-facb356a6dd6 response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231402025-03-07T23:30:49.668ZINFOtest_unauthorized (external client test context): client received response status = 401
231412025-03-07T23:30:49.668ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231422025-03-07T23:30:49.668ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231432025-03-07T23:30:49.668ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eef1c4aa-0d57-4e83-a0f4-485643d02e3f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231442025-03-07T23:30:49.669ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eef1c4aa-0d57-4e83-a0f4-485643d02e3f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231452025-03-07T23:30:49.669ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eef1c4aa-0d57-4e83-a0f4-485643d02e3f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231462025-03-07T23:30:49.669ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 458 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eef1c4aa-0d57-4e83-a0f4-485643d02e3f response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231472025-03-07T23:30:49.669ZINFOtest_unauthorized (external client test context): client received response status = 401
231482025-03-07T23:30:49.669ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231492025-03-07T23:30:49.670ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231502025-03-07T23:30:49.670ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a16adea-0ccb-4b75-9011-436e9a9d682f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231512025-03-07T23:30:49.670ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a16adea-0ccb-4b75-9011-436e9a9d682f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231522025-03-07T23:30:49.672ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5049:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcSubnet>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5068:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcSubnet>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcSubnet>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a16adea-0ccb-4b75-9011-436e9a9d682f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231532025-03-07T23:30:49.672ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2384 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9a16adea-0ccb-4b75-9011-436e9a9d682f response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231542025-03-07T23:30:49.672ZINFOtest_unauthorized (external client test context): client received response status = 401
231552025-03-07T23:30:49.673ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231562025-03-07T23:30:49.673ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231572025-03-07T23:30:49.673ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2fd1179e-9dec-46eb-94ef-e857bbd2c417 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231582025-03-07T23:30:49.674ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 352 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2fd1179e-9dec-46eb-94ef-e857bbd2c417 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231592025-03-07T23:30:49.674ZINFOtest_unauthorized (external client test context): client received response status = 405
231602025-03-07T23:30:49.674ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231612025-03-07T23:30:49.674ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231622025-03-07T23:30:49.675ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 530bac90-a136-4408-8343-8d67e09cbc8c uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231632025-03-07T23:30:49.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 138 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 530bac90-a136-4408-8343-8d67e09cbc8c response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231642025-03-07T23:30:49.675ZINFOtest_unauthorized (external client test context): client received response status = 405
231652025-03-07T23:30:49.676ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231662025-03-07T23:30:49.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231672025-03-07T23:30:49.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d3e45b7c-2d3b-4e12-9e51-15d03fb299d5 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231682025-03-07T23:30:49.676ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 142 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d3e45b7c-2d3b-4e12-9e51-15d03fb299d5 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231692025-03-07T23:30:49.676ZINFOtest_unauthorized (external client test context): client received response status = 405
231702025-03-07T23:30:49.677ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231712025-03-07T23:30:49.677ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231722025-03-07T23:30:49.677ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 51dbcb62-0c24-4c9d-bb30-21986f37764f uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231732025-03-07T23:30:49.677ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 139 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 51dbcb62-0c24-4c9d-bb30-21986f37764f response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231742025-03-07T23:30:49.677ZINFOtest_unauthorized (external client test context): client received response status = 405
231752025-03-07T23:30:49.678ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231762025-03-07T23:30:49.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231772025-03-07T23:30:49.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231782025-03-07T23:30:49.678ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231792025-03-07T23:30:49.679ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
231802025-03-07T23:30:49.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231812025-03-07T23:30:49.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231822025-03-07T23:30:49.680ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231832025-03-07T23:30:49.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231842025-03-07T23:30:49.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231852025-03-07T23:30:49.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231862025-03-07T23:30:49.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
231872025-03-07T23:30:49.709ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
231882025-03-07T23:30:49.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231892025-03-07T23:30:49.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231902025-03-07T23:30:49.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231912025-03-07T23:30:49.715ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
231922025-03-07T23:30:49.715ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231932025-03-07T23:30:49.716ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231942025-03-07T23:30:49.717ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
231952025-03-07T23:30:49.722ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
231962025-03-07T23:30:49.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
231972025-03-07T23:30:49.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
231982025-03-07T23:30:49.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
231992025-03-07T23:30:49.725ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232002025-03-07T23:30:49.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
232012025-03-07T23:30:49.736ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
232022025-03-07T23:30:49.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232032025-03-07T23:30:49.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232042025-03-07T23:30:49.736ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232052025-03-07T23:30:49.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
232062025-03-07T23:30:49.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
232072025-03-07T23:30:49.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
232082025-03-07T23:30:49.741ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
232092025-03-07T23:30:49.750ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
232102025-03-07T23:30:49.753ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
232112025-03-07T23:30:49.753ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232122025-03-07T23:30:49.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232132025-03-07T23:30:49.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232142025-03-07T23:30:49.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232152025-03-07T23:30:49.762ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232162025-03-07T23:30:49.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232172025-03-07T23:30:49.763ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232182025-03-07T23:30:49.792ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232192025-03-07T23:30:49.792ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232202025-03-07T23:30:49.800ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232212025-03-07T23:30:49.823ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232222025-03-07T23:30:49.824ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232232025-03-07T23:30:49.824ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232242025-03-07T23:30:49.824ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232252025-03-07T23:30:49.826ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232262025-03-07T23:30:49.838ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232272025-03-07T23:30:49.838ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232282025-03-07T23:30:49.838ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232292025-03-07T23:30:49.839ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232302025-03-07T23:30:49.858ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232312025-03-07T23:30:49.858ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232322025-03-07T23:30:49.858ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232332025-03-07T23:30:49.859ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232342025-03-07T23:30:49.865ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232352025-03-07T23:30:49.892ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232362025-03-07T23:30:49.893ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 214664 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2761a9bc-2cc7-474f-bea4-f1cc6b8df29e response_code = 404 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232372025-03-07T23:30:49.893ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
232382025-03-07T23:30:49.899ZINFOtest_unauthorized (external client test context): client received response status = 404
232392025-03-07T23:30:49.899ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232402025-03-07T23:30:49.899ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232412025-03-07T23:30:49.900ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a25bee84-09c8-48dc-a865-68e90aae8d71 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232422025-03-07T23:30:49.900ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a25bee84-09c8-48dc-a865-68e90aae8d71 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232432025-03-07T23:30:49.900ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a25bee84-09c8-48dc-a865-68e90aae8d71 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232442025-03-07T23:30:49.900ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a25bee84-09c8-48dc-a865-68e90aae8d71 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232452025-03-07T23:30:49.900ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 454 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a25bee84-09c8-48dc-a865-68e90aae8d71 response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232462025-03-07T23:30:49.901ZINFOtest_unauthorized (external client test context): client received response status = 401
232472025-03-07T23:30:49.901ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232482025-03-07T23:30:49.901ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232492025-03-07T23:30:49.901ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d484d6e-fd0a-48de-966b-4ad46493e396 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232502025-03-07T23:30:49.901ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d484d6e-fd0a-48de-966b-4ad46493e396 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232512025-03-07T23:30:49.901ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d484d6e-fd0a-48de-966b-4ad46493e396 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232522025-03-07T23:30:49.901ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 237 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d484d6e-fd0a-48de-966b-4ad46493e396 response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232532025-03-07T23:30:49.901ZINFOtest_unauthorized (external client test context): client received response status = 401
232542025-03-07T23:30:49.901ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232552025-03-07T23:30:49.901ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232562025-03-07T23:30:49.902ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f58fa9c-2e75-4d96-81ec-2e6c22a70104 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232572025-03-07T23:30:49.902ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f58fa9c-2e75-4d96-81ec-2e6c22a70104 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232582025-03-07T23:30:49.903ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5082:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcSubnet>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5092:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcSubnet>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcSubnet>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f58fa9c-2e75-4d96-81ec-2e6c22a70104 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232592025-03-07T23:30:49.903ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1329 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f58fa9c-2e75-4d96-81ec-2e6c22a70104 response_code = 401 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232602025-03-07T23:30:49.903ZINFOtest_unauthorized (external client test context): client received response status = 401
232612025-03-07T23:30:49.903ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232622025-03-07T23:30:49.903ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232632025-03-07T23:30:49.904ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b04fa1a7-b789-46ac-bbcf-100b819c3602 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232642025-03-07T23:30:49.904ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b04fa1a7-b789-46ac-bbcf-100b819c3602 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232652025-03-07T23:30:49.904ZINFOtest_unauthorized (external client test context): client received response status = 405
232662025-03-07T23:30:49.904ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232672025-03-07T23:30:49.904ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232682025-03-07T23:30:49.904ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 27b96e27-106a-4fef-9ff6-1f622a2eeddc uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232692025-03-07T23:30:49.904ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 27b96e27-106a-4fef-9ff6-1f622a2eeddc response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232702025-03-07T23:30:49.904ZINFOtest_unauthorized (external client test context): client received response status = 405
232712025-03-07T23:30:49.904ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232722025-03-07T23:30:49.905ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232732025-03-07T23:30:49.905ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 34533611-ae0e-4d66-997f-6f6991210eb8 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232742025-03-07T23:30:49.905ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 34533611-ae0e-4d66-997f-6f6991210eb8 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232752025-03-07T23:30:49.905ZINFOtest_unauthorized (external client test context): client received response status = 405
232762025-03-07T23:30:49.905ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232772025-03-07T23:30:49.905ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232782025-03-07T23:30:49.906ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = eec62be2-c8ca-4457-9bf8-e6ff32345af4 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232792025-03-07T23:30:49.906ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = eec62be2-c8ca-4457-9bf8-e6ff32345af4 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232802025-03-07T23:30:49.906ZINFOtest_unauthorized (external client test context): client received response status = 405
232812025-03-07T23:30:49.906ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232822025-03-07T23:30:49.906ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232832025-03-07T23:30:49.906ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 22d456fe-f3e1-4e33-9834-3ca0e5c41200 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232842025-03-07T23:30:49.907ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 22d456fe-f3e1-4e33-9834-3ca0e5c41200 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232852025-03-07T23:30:49.907ZINFOtest_unauthorized (external client test context): client received response status = 405
232862025-03-07T23:30:49.907ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232872025-03-07T23:30:49.907ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232882025-03-07T23:30:49.907ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 680b90ab-533b-4b3b-8b67-9a1fc28521a3 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232892025-03-07T23:30:49.907ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 680b90ab-533b-4b3b-8b67-9a1fc28521a3 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232902025-03-07T23:30:49.908ZINFOtest_unauthorized (external client test context): client received response status = 405
232912025-03-07T23:30:49.908ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232922025-03-07T23:30:49.908ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232932025-03-07T23:30:49.908ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = acd34a33-1963-45fb-9b4d-ae34cf3a2ba9 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232942025-03-07T23:30:49.908ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 100 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = acd34a33-1963-45fb-9b4d-ae34cf3a2ba9 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232952025-03-07T23:30:49.908ZINFOtest_unauthorized (external client test context): client received response status = 405
232962025-03-07T23:30:49.908ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232972025-03-07T23:30:49.908ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232982025-03-07T23:30:49.909ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1753eff6-8e38-4da6-939b-684c44bdc126 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
232992025-03-07T23:30:49.909ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1753eff6-8e38-4da6-939b-684c44bdc126 response_code = 405 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233002025-03-07T23:30:49.909ZINFOtest_unauthorized (external client test context): client received response status = 405
233012025-03-07T23:30:49.909ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233022025-03-07T23:30:49.909ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233032025-03-07T23:30:49.909ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233042025-03-07T23:30:49.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233052025-03-07T23:30:49.910ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233062025-03-07T23:30:49.910ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233072025-03-07T23:30:49.910ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233082025-03-07T23:30:49.910ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233092025-03-07T23:30:49.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233102025-03-07T23:30:49.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233112025-03-07T23:30:49.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233122025-03-07T23:30:49.937ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
233132025-03-07T23:30:49.951ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
233142025-03-07T23:30:49.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233152025-03-07T23:30:49.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233162025-03-07T23:30:49.952ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233172025-03-07T23:30:49.966ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
233182025-03-07T23:30:49.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233192025-03-07T23:30:49.967ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233202025-03-07T23:30:49.967ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233212025-03-07T23:30:49.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
233222025-03-07T23:30:49.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
233232025-03-07T23:30:49.980ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233242025-03-07T23:30:49.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233252025-03-07T23:30:49.981ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233262025-03-07T23:30:50.003ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
233272025-03-07T23:30:50.003ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
233282025-03-07T23:30:50.004ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233292025-03-07T23:30:50.004ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233302025-03-07T23:30:50.005ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233312025-03-07T23:30:50.012ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
233322025-03-07T23:30:50.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
233332025-03-07T23:30:50.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
233342025-03-07T23:30:50.013ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
233352025-03-07T23:30:50.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
233362025-03-07T23:30:50.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
233372025-03-07T23:30:50.024ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233382025-03-07T23:30:50.025ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233392025-03-07T23:30:50.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233402025-03-07T23:30:50.025ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233412025-03-07T23:30:50.031ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233422025-03-07T23:30:50.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233432025-03-07T23:30:50.032ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233442025-03-07T23:30:50.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233452025-03-07T23:30:50.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233462025-03-07T23:30:50.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233472025-03-07T23:30:50.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233482025-03-07T23:30:50.051ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233492025-03-07T23:30:50.051ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233502025-03-07T23:30:50.051ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233512025-03-07T23:30:50.052ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233522025-03-07T23:30:50.066ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233532025-03-07T23:30:50.067ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233542025-03-07T23:30:50.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233552025-03-07T23:30:50.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233562025-03-07T23:30:50.080ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233572025-03-07T23:30:50.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233582025-03-07T23:30:50.080ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233592025-03-07T23:30:50.081ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233602025-03-07T23:30:50.084ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233612025-03-07T23:30:50.111ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233622025-03-07T23:30:50.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233632025-03-07T23:30:50.111ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233642025-03-07T23:30:50.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233652025-03-07T23:30:50.111ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233662025-03-07T23:30:50.112ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233672025-03-07T23:30:50.140ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
233682025-03-07T23:30:50.142ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
233692025-03-07T23:30:50.142ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
233702025-03-07T23:30:50.142ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
233712025-03-07T23:30:50.142ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
233722025-03-07T23:30:50.142ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
233732025-03-07T23:30:50.145ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233742025-03-07T23:30:50.145ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233752025-03-07T23:30:50.145ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233762025-03-07T23:30:50.153ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233772025-03-07T23:30:50.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
233782025-03-07T23:30:50.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
233792025-03-07T23:30:50.158ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233802025-03-07T23:30:50.158ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233812025-03-07T23:30:50.158ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233822025-03-07T23:30:50.159ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233832025-03-07T23:30:50.159ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
233842025-03-07T23:30:50.160ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
233852025-03-07T23:30:50.164ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
233862025-03-07T23:30:50.164ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
233872025-03-07T23:30:50.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233882025-03-07T23:30:50.175ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233892025-03-07T23:30:50.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233902025-03-07T23:30:50.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233912025-03-07T23:30:50.176ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d resource = Database result = Ok(()) uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233922025-03-07T23:30:50.194ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
233932025-03-07T23:30:50.194ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
233942025-03-07T23:30:50.195ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 285354 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 07e1b5f5-de09-4c0b-92f7-09ca7b89be1d response_code = 200 uri = /v1/vpc-subnets?project=demo-project&vpc=demo-vpc
233952025-03-07T23:30:50.196ZINFOtest_unauthorized (external client test context): client received response status = 200
233962025-03-07T23:30:50.196ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233972025-03-07T23:30:50.196ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233982025-03-07T23:30:50.196ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
233992025-03-07T23:30:50.196ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234002025-03-07T23:30:50.197ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234012025-03-07T23:30:50.197ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234022025-03-07T23:30:50.197ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234032025-03-07T23:30:50.197ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234042025-03-07T23:30:50.197ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234052025-03-07T23:30:50.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234062025-03-07T23:30:50.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234072025-03-07T23:30:50.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234082025-03-07T23:30:50.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
234092025-03-07T23:30:50.207ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
234102025-03-07T23:30:50.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234112025-03-07T23:30:50.207ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234122025-03-07T23:30:50.208ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234132025-03-07T23:30:50.210ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
234142025-03-07T23:30:50.210ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234152025-03-07T23:30:50.210ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234162025-03-07T23:30:50.211ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234172025-03-07T23:30:50.213ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
234182025-03-07T23:30:50.219ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
234192025-03-07T23:30:50.219ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234202025-03-07T23:30:50.219ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234212025-03-07T23:30:50.220ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234222025-03-07T23:30:50.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
234232025-03-07T23:30:50.249ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
234242025-03-07T23:30:50.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234252025-03-07T23:30:50.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234262025-03-07T23:30:50.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234272025-03-07T23:30:50.259ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
234282025-03-07T23:30:50.259ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
234292025-03-07T23:30:50.259ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234302025-03-07T23:30:50.259ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234312025-03-07T23:30:50.260ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234322025-03-07T23:30:50.264ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
234332025-03-07T23:30:50.269ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
234342025-03-07T23:30:50.270ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234352025-03-07T23:30:50.270ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234362025-03-07T23:30:50.270ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234372025-03-07T23:30:50.270ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234382025-03-07T23:30:50.285ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234392025-03-07T23:30:50.285ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234402025-03-07T23:30:50.286ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234412025-03-07T23:30:50.289ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234422025-03-07T23:30:50.289ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234432025-03-07T23:30:50.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234442025-03-07T23:30:50.317ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234452025-03-07T23:30:50.317ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234462025-03-07T23:30:50.317ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234472025-03-07T23:30:50.326ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234482025-03-07T23:30:50.326ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234492025-03-07T23:30:50.326ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234502025-03-07T23:30:50.326ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234512025-03-07T23:30:50.327ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234522025-03-07T23:30:50.330ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234532025-03-07T23:30:50.330ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234542025-03-07T23:30:50.330ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234552025-03-07T23:30:50.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234562025-03-07T23:30:50.334ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234572025-03-07T23:30:50.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234582025-03-07T23:30:50.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234592025-03-07T23:30:50.335ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234602025-03-07T23:30:50.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234612025-03-07T23:30:50.359ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234622025-03-07T23:30:50.360ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 163845 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b21a860e-074a-4a9c-a3eb-cca1ac487e66 response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234632025-03-07T23:30:50.361ZINFOtest_unauthorized (external client test context): client received response status = 200
234642025-03-07T23:30:50.363ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234652025-03-07T23:30:50.363ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234662025-03-07T23:30:50.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234672025-03-07T23:30:50.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234682025-03-07T23:30:50.364ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
234692025-03-07T23:30:50.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234702025-03-07T23:30:50.364ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234712025-03-07T23:30:50.365ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234722025-03-07T23:30:50.369ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234732025-03-07T23:30:50.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234742025-03-07T23:30:50.401ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234752025-03-07T23:30:50.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
234762025-03-07T23:30:50.407ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
234772025-03-07T23:30:50.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234782025-03-07T23:30:50.407ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234792025-03-07T23:30:50.407ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234802025-03-07T23:30:50.428ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
234812025-03-07T23:30:50.428ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234822025-03-07T23:30:50.428ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234832025-03-07T23:30:50.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234842025-03-07T23:30:50.435ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
234852025-03-07T23:30:50.441ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
234862025-03-07T23:30:50.443ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234872025-03-07T23:30:50.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234882025-03-07T23:30:50.446ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234892025-03-07T23:30:50.450ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
234902025-03-07T23:30:50.450ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
234912025-03-07T23:30:50.450ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234922025-03-07T23:30:50.451ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234932025-03-07T23:30:50.451ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234942025-03-07T23:30:50.456ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
234952025-03-07T23:30:50.456ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
234962025-03-07T23:30:50.456ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
234972025-03-07T23:30:50.457ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
234982025-03-07T23:30:50.459ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
234992025-03-07T23:30:50.463ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
235002025-03-07T23:30:50.463ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235012025-03-07T23:30:50.463ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235022025-03-07T23:30:50.463ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235032025-03-07T23:30:50.464ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235042025-03-07T23:30:50.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235052025-03-07T23:30:50.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235062025-03-07T23:30:50.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235072025-03-07T23:30:50.498ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235082025-03-07T23:30:50.498ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235092025-03-07T23:30:50.499ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235102025-03-07T23:30:50.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235112025-03-07T23:30:50.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235122025-03-07T23:30:50.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235132025-03-07T23:30:50.523ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235142025-03-07T23:30:50.526ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235152025-03-07T23:30:50.526ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235162025-03-07T23:30:50.527ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235172025-03-07T23:30:50.527ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235182025-03-07T23:30:50.531ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235192025-03-07T23:30:50.532ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235202025-03-07T23:30:50.532ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235212025-03-07T23:30:50.535ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235222025-03-07T23:30:50.539ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235232025-03-07T23:30:50.539ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235242025-03-07T23:30:50.539ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235252025-03-07T23:30:50.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235262025-03-07T23:30:50.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
235272025-03-07T23:30:50.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
235282025-03-07T23:30:50.562ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235292025-03-07T23:30:50.581ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235302025-03-07T23:30:50.581ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 217426 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dfd8d963-d27b-49fc-b41a-3bfd99802393 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235312025-03-07T23:30:50.584ZINFOtest_unauthorized (external client test context): client received response status = 404
235322025-03-07T23:30:50.584ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235332025-03-07T23:30:50.584ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235342025-03-07T23:30:50.585ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
235352025-03-07T23:30:50.586ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
235362025-03-07T23:30:50.586ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
235372025-03-07T23:30:50.586ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
235382025-03-07T23:30:50.586ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3cbabac5-06e2-4901-b470-14882feb1100 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235392025-03-07T23:30:50.587ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3cbabac5-06e2-4901-b470-14882feb1100 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235402025-03-07T23:30:50.589ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3cbabac5-06e2-4901-b470-14882feb1100 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235412025-03-07T23:30:50.589ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3cbabac5-06e2-4901-b470-14882feb1100 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235422025-03-07T23:30:50.589ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 2874 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3cbabac5-06e2-4901-b470-14882feb1100 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235432025-03-07T23:30:50.590ZINFOtest_unauthorized (external client test context): client received response status = 401
235442025-03-07T23:30:50.590ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235452025-03-07T23:30:50.590ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235462025-03-07T23:30:50.590ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1faad95-7b15-4cee-9652-056e77a0e32a uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235472025-03-07T23:30:50.591ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1faad95-7b15-4cee-9652-056e77a0e32a uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235482025-03-07T23:30:50.591ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1faad95-7b15-4cee-9652-056e77a0e32a uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235492025-03-07T23:30:50.591ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 592 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1faad95-7b15-4cee-9652-056e77a0e32a response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235502025-03-07T23:30:50.592ZINFOtest_unauthorized (external client test context): client received response status = 401
235512025-03-07T23:30:50.593ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235522025-03-07T23:30:50.593ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235532025-03-07T23:30:50.593ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ea392919-342a-49d3-8af0-ca812f6a1f92 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235542025-03-07T23:30:50.594ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ea392919-342a-49d3-8af0-ca812f6a1f92 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235552025-03-07T23:30:50.596ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5106:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5122:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ea392919-342a-49d3-8af0-ca812f6a1f92 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235562025-03-07T23:30:50.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3449 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ea392919-342a-49d3-8af0-ca812f6a1f92 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235572025-03-07T23:30:50.598ZINFOtest_unauthorized (external client test context): client received response status = 401
235582025-03-07T23:30:50.598ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235592025-03-07T23:30:50.598ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235602025-03-07T23:30:50.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235612025-03-07T23:30:50.599ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235622025-03-07T23:30:50.599ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235632025-03-07T23:30:50.599ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235642025-03-07T23:30:50.607ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235652025-03-07T23:30:50.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235662025-03-07T23:30:50.644ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235672025-03-07T23:30:50.644ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235682025-03-07T23:30:50.646ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235692025-03-07T23:30:50.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
235702025-03-07T23:30:50.652ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
235712025-03-07T23:30:50.652ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235722025-03-07T23:30:50.652ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235732025-03-07T23:30:50.653ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235742025-03-07T23:30:50.679ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
235752025-03-07T23:30:50.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235762025-03-07T23:30:50.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235772025-03-07T23:30:50.680ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235782025-03-07T23:30:50.696ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
235792025-03-07T23:30:50.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
235802025-03-07T23:30:50.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235812025-03-07T23:30:50.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235822025-03-07T23:30:50.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235832025-03-07T23:30:50.714ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
235842025-03-07T23:30:50.715ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
235852025-03-07T23:30:50.715ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235862025-03-07T23:30:50.715ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235872025-03-07T23:30:50.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235882025-03-07T23:30:50.719ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
235892025-03-07T23:30:50.720ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
235902025-03-07T23:30:50.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
235912025-03-07T23:30:50.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
235922025-03-07T23:30:50.723ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
235932025-03-07T23:30:50.727ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
235942025-03-07T23:30:50.727ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235952025-03-07T23:30:50.727ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235962025-03-07T23:30:50.727ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235972025-03-07T23:30:50.728ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235982025-03-07T23:30:50.745ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
235992025-03-07T23:30:50.752ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236002025-03-07T23:30:50.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236012025-03-07T23:30:50.764ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236022025-03-07T23:30:50.764ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236032025-03-07T23:30:50.766ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236042025-03-07T23:30:50.774ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236052025-03-07T23:30:50.774ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236062025-03-07T23:30:50.775ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236072025-03-07T23:30:50.793ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236082025-03-07T23:30:50.793ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236092025-03-07T23:30:50.793ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236102025-03-07T23:30:50.793ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236112025-03-07T23:30:50.794ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236122025-03-07T23:30:50.810ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236132025-03-07T23:30:50.810ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236142025-03-07T23:30:50.810ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236152025-03-07T23:30:50.811ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236162025-03-07T23:30:50.829ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236172025-03-07T23:30:50.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236182025-03-07T23:30:50.829ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236192025-03-07T23:30:50.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236202025-03-07T23:30:50.835ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236212025-03-07T23:30:50.871ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236222025-03-07T23:30:50.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 272602 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 96629650-b6f0-4127-8c60-c89996b50b21 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236232025-03-07T23:30:50.872ZINFOtest_unauthorized (external client test context): client received response status = 404
236242025-03-07T23:30:50.873ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236252025-03-07T23:30:50.873ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236262025-03-07T23:30:50.873ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1fe85100-25e2-4e99-a6ef-6e798aee8a13 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236272025-03-07T23:30:50.873ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1fe85100-25e2-4e99-a6ef-6e798aee8a13 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236282025-03-07T23:30:50.873ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1fe85100-25e2-4e99-a6ef-6e798aee8a13 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236292025-03-07T23:30:50.874ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1fe85100-25e2-4e99-a6ef-6e798aee8a13 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236302025-03-07T23:30:50.874ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 559 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1fe85100-25e2-4e99-a6ef-6e798aee8a13 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236312025-03-07T23:30:50.874ZINFOtest_unauthorized (external client test context): client received response status = 401
236322025-03-07T23:30:50.874ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236332025-03-07T23:30:50.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236342025-03-07T23:30:50.874ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b2a7e407-3202-4ab3-a562-621d284bb7d5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236352025-03-07T23:30:50.874ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b2a7e407-3202-4ab3-a562-621d284bb7d5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236362025-03-07T23:30:50.874ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b2a7e407-3202-4ab3-a562-621d284bb7d5 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236372025-03-07T23:30:50.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 267 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b2a7e407-3202-4ab3-a562-621d284bb7d5 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236382025-03-07T23:30:50.875ZINFOtest_unauthorized (external client test context): client received response status = 401
236392025-03-07T23:30:50.875ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236402025-03-07T23:30:50.875ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236412025-03-07T23:30:50.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ee757165-5cd5-4c63-8005-dc31869b3515 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236422025-03-07T23:30:50.875ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ee757165-5cd5-4c63-8005-dc31869b3515 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236432025-03-07T23:30:50.877ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5167:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5184:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcSubnetUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcSubnet>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ee757165-5cd5-4c63-8005-dc31869b3515 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236442025-03-07T23:30:50.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3640 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ee757165-5cd5-4c63-8005-dc31869b3515 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236452025-03-07T23:30:50.879ZINFOtest_unauthorized (external client test context): client received response status = 401
236462025-03-07T23:30:50.879ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236472025-03-07T23:30:50.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236482025-03-07T23:30:50.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5b864414-35f3-48f8-87e6-820d02b1a45e uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236492025-03-07T23:30:50.880ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5b864414-35f3-48f8-87e6-820d02b1a45e response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236502025-03-07T23:30:50.880ZINFOtest_unauthorized (external client test context): client received response status = 405
236512025-03-07T23:30:50.880ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236522025-03-07T23:30:50.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236532025-03-07T23:30:50.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95572397-191a-4b35-9995-80bc0430984c uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236542025-03-07T23:30:50.880ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 119 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 95572397-191a-4b35-9995-80bc0430984c response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236552025-03-07T23:30:50.880ZINFOtest_unauthorized (external client test context): client received response status = 405
236562025-03-07T23:30:50.880ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236572025-03-07T23:30:50.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236582025-03-07T23:30:50.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = db7b1fef-5d46-43d8-b52f-c13ccee10f59 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236592025-03-07T23:30:50.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = db7b1fef-5d46-43d8-b52f-c13ccee10f59 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236602025-03-07T23:30:50.881ZINFOtest_unauthorized (external client test context): client received response status = 405
236612025-03-07T23:30:50.881ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236622025-03-07T23:30:50.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236632025-03-07T23:30:50.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1bd39fe2-f21a-43c8-9d4f-e97b1aae4e6e uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236642025-03-07T23:30:50.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1bd39fe2-f21a-43c8-9d4f-e97b1aae4e6e response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236652025-03-07T23:30:50.881ZINFOtest_unauthorized (external client test context): client received response status = 405
236662025-03-07T23:30:50.881ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236672025-03-07T23:30:50.882ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236682025-03-07T23:30:50.882ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236692025-03-07T23:30:50.882ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236702025-03-07T23:30:50.882ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
236712025-03-07T23:30:50.882ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236722025-03-07T23:30:50.882ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236732025-03-07T23:30:50.883ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236742025-03-07T23:30:50.890ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236752025-03-07T23:30:50.890ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236762025-03-07T23:30:50.891ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236772025-03-07T23:30:50.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
236782025-03-07T23:30:50.905ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
236792025-03-07T23:30:50.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236802025-03-07T23:30:50.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236812025-03-07T23:30:50.907ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236822025-03-07T23:30:50.923ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
236832025-03-07T23:30:50.923ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236842025-03-07T23:30:50.923ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236852025-03-07T23:30:50.924ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236862025-03-07T23:30:50.927ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
236872025-03-07T23:30:50.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
236882025-03-07T23:30:50.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236892025-03-07T23:30:50.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236902025-03-07T23:30:50.933ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236912025-03-07T23:30:50.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
236922025-03-07T23:30:50.940ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
236932025-03-07T23:30:50.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236942025-03-07T23:30:50.940ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236952025-03-07T23:30:50.941ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
236962025-03-07T23:30:50.945ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
236972025-03-07T23:30:50.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
236982025-03-07T23:30:50.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
236992025-03-07T23:30:50.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237002025-03-07T23:30:50.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
237012025-03-07T23:30:50.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
237022025-03-07T23:30:50.960ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237032025-03-07T23:30:50.960ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237042025-03-07T23:30:50.960ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237052025-03-07T23:30:50.961ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237062025-03-07T23:30:50.986ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237072025-03-07T23:30:50.986ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237082025-03-07T23:30:50.987ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237092025-03-07T23:30:51.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237102025-03-07T23:30:51.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237112025-03-07T23:30:51.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237122025-03-07T23:30:51.015ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237132025-03-07T23:30:51.017ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237142025-03-07T23:30:51.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237152025-03-07T23:30:51.025ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237162025-03-07T23:30:51.025ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237172025-03-07T23:30:51.025ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237182025-03-07T23:30:51.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237192025-03-07T23:30:51.026ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237202025-03-07T23:30:51.029ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237212025-03-07T23:30:51.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237222025-03-07T23:30:51.030ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237232025-03-07T23:30:51.031ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237242025-03-07T23:30:51.044ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
237252025-03-07T23:30:51.044ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
237262025-03-07T23:30:51.046ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237272025-03-07T23:30:51.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237282025-03-07T23:30:51.047ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237292025-03-07T23:30:51.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237302025-03-07T23:30:51.055ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237312025-03-07T23:30:51.088ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237322025-03-07T23:30:51.088ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 206446 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1f5d2314-4645-4e4f-8778-b45be5d73792 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237332025-03-07T23:30:51.089ZINFOtest_unauthorized (external client test context): client received response status = 404
237342025-03-07T23:30:51.089ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237352025-03-07T23:30:51.089ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237362025-03-07T23:30:51.089ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d41a939-57d1-4ded-a331-30c4a3790e0b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237372025-03-07T23:30:51.090ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d41a939-57d1-4ded-a331-30c4a3790e0b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237382025-03-07T23:30:51.090ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d41a939-57d1-4ded-a331-30c4a3790e0b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237392025-03-07T23:30:51.090ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d41a939-57d1-4ded-a331-30c4a3790e0b uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237402025-03-07T23:30:51.090ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 420 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7d41a939-57d1-4ded-a331-30c4a3790e0b response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237412025-03-07T23:30:51.090ZINFOtest_unauthorized (external client test context): client received response status = 401
237422025-03-07T23:30:51.090ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237432025-03-07T23:30:51.090ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237442025-03-07T23:30:51.091ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 24838afd-1fb1-4113-898e-d6469c194fdd uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237452025-03-07T23:30:51.091ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 24838afd-1fb1-4113-898e-d6469c194fdd uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237462025-03-07T23:30:51.091ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 24838afd-1fb1-4113-898e-d6469c194fdd uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237472025-03-07T23:30:51.091ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 289 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 24838afd-1fb1-4113-898e-d6469c194fdd response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237482025-03-07T23:30:51.091ZINFOtest_unauthorized (external client test context): client received response status = 401
237492025-03-07T23:30:51.091ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237502025-03-07T23:30:51.091ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237512025-03-07T23:30:51.091ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c51e9970-ae37-4858-87ca-e01c48d36246 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237522025-03-07T23:30:51.092ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c51e9970-ae37-4858-87ca-e01c48d36246 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237532025-03-07T23:30:51.093ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5136:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5151:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c51e9970-ae37-4858-87ca-e01c48d36246 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237542025-03-07T23:30:51.093ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1323 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c51e9970-ae37-4858-87ca-e01c48d36246 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237552025-03-07T23:30:51.093ZINFOtest_unauthorized (external client test context): client received response status = 401
237562025-03-07T23:30:51.093ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237572025-03-07T23:30:51.093ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237582025-03-07T23:30:51.094ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bac3d43b-6c26-498a-8a33-7917b0e677fc uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237592025-03-07T23:30:51.094ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 106 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bac3d43b-6c26-498a-8a33-7917b0e677fc response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237602025-03-07T23:30:51.094ZINFOtest_unauthorized (external client test context): client received response status = 405
237612025-03-07T23:30:51.094ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237622025-03-07T23:30:51.094ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237632025-03-07T23:30:51.094ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 28fff943-88fb-4a56-97dc-4ea00cb86075 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237642025-03-07T23:30:51.094ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 306 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 28fff943-88fb-4a56-97dc-4ea00cb86075 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237652025-03-07T23:30:51.095ZINFOtest_unauthorized (external client test context): client received response status = 405
237662025-03-07T23:30:51.095ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237672025-03-07T23:30:51.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237682025-03-07T23:30:51.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d13e6c4-6a04-4d58-a490-a4fa882ce6f6 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237692025-03-07T23:30:51.095ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d13e6c4-6a04-4d58-a490-a4fa882ce6f6 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237702025-03-07T23:30:51.095ZINFOtest_unauthorized (external client test context): client received response status = 405
237712025-03-07T23:30:51.095ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237722025-03-07T23:30:51.097ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237732025-03-07T23:30:51.098ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 59bb58a3-3c8a-402e-82df-26909cd33b86 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237742025-03-07T23:30:51.098ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 59bb58a3-3c8a-402e-82df-26909cd33b86 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237752025-03-07T23:30:51.098ZINFOtest_unauthorized (external client test context): client received response status = 405
237762025-03-07T23:30:51.098ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237772025-03-07T23:30:51.098ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237782025-03-07T23:30:51.098ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237792025-03-07T23:30:51.098ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237802025-03-07T23:30:51.098ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
237812025-03-07T23:30:51.098ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237822025-03-07T23:30:51.099ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237832025-03-07T23:30:51.100ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237842025-03-07T23:30:51.105ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237852025-03-07T23:30:51.105ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237862025-03-07T23:30:51.106ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237872025-03-07T23:30:51.133ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
237882025-03-07T23:30:51.144ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
237892025-03-07T23:30:51.144ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237902025-03-07T23:30:51.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237912025-03-07T23:30:51.147ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
237922025-03-07T23:30:51.168ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
237932025-03-07T23:30:51.168ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
237942025-03-07T23:30:51.169ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
237952025-03-07T23:30:51.170ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
237962025-03-07T23:30:51.181ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
237972025-03-07T23:30:51.181ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
237982025-03-07T23:30:51.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
237992025-03-07T23:30:51.183ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238002025-03-07T23:30:51.183ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
238012025-03-07T23:30:51.184ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
238022025-03-07T23:30:51.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
238032025-03-07T23:30:51.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
238042025-03-07T23:30:51.191ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238052025-03-07T23:30:51.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238062025-03-07T23:30:51.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238072025-03-07T23:30:51.193ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
238082025-03-07T23:30:51.193ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
238092025-03-07T23:30:51.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
238102025-03-07T23:30:51.195ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
238112025-03-07T23:30:51.195ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238122025-03-07T23:30:51.195ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238132025-03-07T23:30:51.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238142025-03-07T23:30:51.200ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
238152025-03-07T23:30:51.200ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238162025-03-07T23:30:51.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238172025-03-07T23:30:51.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238182025-03-07T23:30:51.214ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
238192025-03-07T23:30:51.217ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
238202025-03-07T23:30:51.217ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238212025-03-07T23:30:51.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238222025-03-07T23:30:51.218ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238232025-03-07T23:30:51.218ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238242025-03-07T23:30:51.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238252025-03-07T23:30:51.221ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238262025-03-07T23:30:51.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238272025-03-07T23:30:51.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238282025-03-07T23:30:51.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238292025-03-07T23:30:51.228ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238302025-03-07T23:30:51.230ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238312025-03-07T23:30:51.230ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238322025-03-07T23:30:51.233ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238332025-03-07T23:30:51.240ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238342025-03-07T23:30:51.240ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238352025-03-07T23:30:51.240ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238362025-03-07T23:30:51.240ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238372025-03-07T23:30:51.241ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238382025-03-07T23:30:51.266ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238392025-03-07T23:30:51.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238402025-03-07T23:30:51.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238412025-03-07T23:30:51.268ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238422025-03-07T23:30:51.271ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
238432025-03-07T23:30:51.280ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238442025-03-07T23:30:51.280ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238452025-03-07T23:30:51.280ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238462025-03-07T23:30:51.282ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238472025-03-07T23:30:51.287ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238482025-03-07T23:30:51.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238492025-03-07T23:30:51.304ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 206188 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31a62c49-3bf2-4b9e-b8d2-a8f52b2171fc response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet?project=demo-project&vpc=demo-vpc
238502025-03-07T23:30:51.305ZINFOtest_unauthorized (external client test context): client received response status = 200
238512025-03-07T23:30:51.305ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238522025-03-07T23:30:51.305ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238532025-03-07T23:30:51.305ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238542025-03-07T23:30:51.305ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238552025-03-07T23:30:51.306ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238562025-03-07T23:30:51.306ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238572025-03-07T23:30:51.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238582025-03-07T23:30:51.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238592025-03-07T23:30:51.307ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238602025-03-07T23:30:51.311ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238612025-03-07T23:30:51.311ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238622025-03-07T23:30:51.311ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238632025-03-07T23:30:51.314ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
238642025-03-07T23:30:51.315ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
238652025-03-07T23:30:51.315ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238662025-03-07T23:30:51.315ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238672025-03-07T23:30:51.317ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238682025-03-07T23:30:51.319ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
238692025-03-07T23:30:51.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238702025-03-07T23:30:51.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238712025-03-07T23:30:51.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238722025-03-07T23:30:51.325ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
238732025-03-07T23:30:51.331ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
238742025-03-07T23:30:51.331ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238752025-03-07T23:30:51.331ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238762025-03-07T23:30:51.332ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238772025-03-07T23:30:51.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
238782025-03-07T23:30:51.346ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
238792025-03-07T23:30:51.346ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238802025-03-07T23:30:51.346ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238812025-03-07T23:30:51.347ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238822025-03-07T23:30:51.355ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
238832025-03-07T23:30:51.355ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
238842025-03-07T23:30:51.355ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
238852025-03-07T23:30:51.356ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
238862025-03-07T23:30:51.361ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
238872025-03-07T23:30:51.368ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
238882025-03-07T23:30:51.368ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238892025-03-07T23:30:51.368ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238902025-03-07T23:30:51.368ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238912025-03-07T23:30:51.370ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238922025-03-07T23:30:51.373ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238932025-03-07T23:30:51.373ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238942025-03-07T23:30:51.374ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238952025-03-07T23:30:51.378ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238962025-03-07T23:30:51.378ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238972025-03-07T23:30:51.378ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238982025-03-07T23:30:51.382ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
238992025-03-07T23:30:51.382ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239002025-03-07T23:30:51.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239012025-03-07T23:30:51.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239022025-03-07T23:30:51.386ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239032025-03-07T23:30:51.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239042025-03-07T23:30:51.387ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239052025-03-07T23:30:51.387ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239062025-03-07T23:30:51.392ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239072025-03-07T23:30:51.392ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239082025-03-07T23:30:51.392ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239092025-03-07T23:30:51.392ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239102025-03-07T23:30:51.403ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239112025-03-07T23:30:51.403ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239122025-03-07T23:30:51.403ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239132025-03-07T23:30:51.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239142025-03-07T23:30:51.416ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
239152025-03-07T23:30:51.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239162025-03-07T23:30:51.428ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239172025-03-07T23:30:51.428ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239182025-03-07T23:30:51.428ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239192025-03-07T23:30:51.428ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239202025-03-07T23:30:51.428ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239212025-03-07T23:30:51.428ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239222025-03-07T23:30:51.429ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
239232025-03-07T23:30:51.430ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 2a888d42-cc72-45e3-aeb5-e300e28e5d3d uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
239242025-03-07T23:30:51.430ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 2a888d42-cc72-45e3-aeb5-e300e28e5d3d resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
239252025-03-07T23:30:51.431ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 2a888d42-cc72-45e3-aeb5-e300e28e5d3d roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
239262025-03-07T23:30:51.431ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 2a888d42-cc72-45e3-aeb5-e300e28e5d3d resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
239272025-03-07T23:30:51.446ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239282025-03-07T23:30:51.446ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239292025-03-07T23:30:51.446ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239302025-03-07T23:30:51.447ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239312025-03-07T23:30:51.447ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 17886 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 2a888d42-cc72-45e3-aeb5-e300e28e5d3d response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
239322025-03-07T23:30:51.447ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "2a888d42-cc72-45e3-aeb5-e300e28e5d3d", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:50 GMT"} })
239332025-03-07T23:30:51.448ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
239342025-03-07T23:30:51.451ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e189755-9032-4c43-8f69-71fb3dfdf3ab uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
239352025-03-07T23:30:51.451ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e189755-9032-4c43-8f69-71fb3dfdf3ab resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
239362025-03-07T23:30:51.451ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e189755-9032-4c43-8f69-71fb3dfdf3ab roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
239372025-03-07T23:30:51.452ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e189755-9032-4c43-8f69-71fb3dfdf3ab resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
239382025-03-07T23:30:51.452ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239392025-03-07T23:30:51.452ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239402025-03-07T23:30:51.452ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239412025-03-07T23:30:51.453ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239422025-03-07T23:30:51.457ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6472 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e189755-9032-4c43-8f69-71fb3dfdf3ab response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
239432025-03-07T23:30:51.458ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "7e189755-9032-4c43-8f69-71fb3dfdf3ab", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:50 GMT"} })
239442025-03-07T23:30:51.458ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
239452025-03-07T23:30:51.458ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
239462025-03-07T23:30:51.458ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
239472025-03-07T23:30:51.462ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239482025-03-07T23:30:51.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239492025-03-07T23:30:51.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239502025-03-07T23:30:51.487ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239512025-03-07T23:30:51.488ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239522025-03-07T23:30:51.494ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 189099 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 31136104-b4da-4db8-bf3d-b63be831e48f response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239532025-03-07T23:30:51.495ZINFOtest_unauthorized (external client test context): client received response status = 200
239542025-03-07T23:30:51.495ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239552025-03-07T23:30:51.495ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239562025-03-07T23:30:51.496ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239572025-03-07T23:30:51.496ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239582025-03-07T23:30:51.496ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239592025-03-07T23:30:51.496ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239602025-03-07T23:30:51.496ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239612025-03-07T23:30:51.497ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239622025-03-07T23:30:51.500ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239632025-03-07T23:30:51.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239642025-03-07T23:30:51.500ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239652025-03-07T23:30:51.505ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
239662025-03-07T23:30:51.505ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
239672025-03-07T23:30:51.505ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239682025-03-07T23:30:51.505ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239692025-03-07T23:30:51.506ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239702025-03-07T23:30:51.508ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
239712025-03-07T23:30:51.508ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239722025-03-07T23:30:51.508ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239732025-03-07T23:30:51.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239742025-03-07T23:30:51.516ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
239752025-03-07T23:30:51.520ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
239762025-03-07T23:30:51.520ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239772025-03-07T23:30:51.521ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239782025-03-07T23:30:51.521ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239792025-03-07T23:30:51.523ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
239802025-03-07T23:30:51.523ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
239812025-03-07T23:30:51.523ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239822025-03-07T23:30:51.523ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239832025-03-07T23:30:51.524ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239842025-03-07T23:30:51.527ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
239852025-03-07T23:30:51.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
239862025-03-07T23:30:51.527ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
239872025-03-07T23:30:51.528ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
239882025-03-07T23:30:51.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
239892025-03-07T23:30:51.537ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
239902025-03-07T23:30:51.537ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239912025-03-07T23:30:51.537ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239922025-03-07T23:30:51.537ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239932025-03-07T23:30:51.538ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239942025-03-07T23:30:51.559ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239952025-03-07T23:30:51.559ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239962025-03-07T23:30:51.559ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239972025-03-07T23:30:51.563ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239982025-03-07T23:30:51.563ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
239992025-03-07T23:30:51.563ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240002025-03-07T23:30:51.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
240012025-03-07T23:30:51.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
240022025-03-07T23:30:51.566ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240032025-03-07T23:30:51.566ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240042025-03-07T23:30:51.567ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240052025-03-07T23:30:51.569ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
240062025-03-07T23:30:51.570ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
240072025-03-07T23:30:51.570ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
240082025-03-07T23:30:51.570ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
240092025-03-07T23:30:51.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240102025-03-07T23:30:51.570ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240112025-03-07T23:30:51.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240122025-03-07T23:30:51.570ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240132025-03-07T23:30:51.571ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240142025-03-07T23:30:51.589ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240152025-03-07T23:30:51.589ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240162025-03-07T23:30:51.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240172025-03-07T23:30:51.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240182025-03-07T23:30:51.604ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240192025-03-07T23:30:51.604ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240202025-03-07T23:30:51.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240212025-03-07T23:30:51.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240222025-03-07T23:30:51.611ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240232025-03-07T23:30:51.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Err(ObjectNotFound { type_name: VpcSubnet, lookup_type: ByName("demo-vpc-subnet") }) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240242025-03-07T23:30:51.645ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-subnet with name "demo-vpc-subnet" error_message_internal = not found: vpc-subnet with name "demo-vpc-subnet" latency_us = 149031 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 83a66600-c984-43a4-acb8-59e7b3e7e084 response_code = 404 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240252025-03-07T23:30:51.645ZINFOtest_unauthorized (external client test context): client received response status = 404
240262025-03-07T23:30:51.645ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240272025-03-07T23:30:51.645ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240282025-03-07T23:30:51.645ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2e383b1-f8ab-4415-b2f1-dc4dfc58fd38 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240292025-03-07T23:30:51.646ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2e383b1-f8ab-4415-b2f1-dc4dfc58fd38 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240302025-03-07T23:30:51.646ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2e383b1-f8ab-4415-b2f1-dc4dfc58fd38 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240312025-03-07T23:30:51.646ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2e383b1-f8ab-4415-b2f1-dc4dfc58fd38 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240322025-03-07T23:30:51.646ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 763 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2e383b1-f8ab-4415-b2f1-dc4dfc58fd38 response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240332025-03-07T23:30:51.646ZINFOtest_unauthorized (external client test context): client received response status = 401
240342025-03-07T23:30:51.647ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240352025-03-07T23:30:51.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240362025-03-07T23:30:51.647ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd8b4d11-51a2-4e41-8983-4eaa84b8201e uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240372025-03-07T23:30:51.647ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd8b4d11-51a2-4e41-8983-4eaa84b8201e uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240382025-03-07T23:30:51.647ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd8b4d11-51a2-4e41-8983-4eaa84b8201e uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240392025-03-07T23:30:51.647ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 226 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bd8b4d11-51a2-4e41-8983-4eaa84b8201e response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240402025-03-07T23:30:51.647ZINFOtest_unauthorized (external client test context): client received response status = 401
240412025-03-07T23:30:51.647ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240422025-03-07T23:30:51.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240432025-03-07T23:30:51.648ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e6025ab-d38f-485c-886d-23101f0866ca uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240442025-03-07T23:30:51.648ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e6025ab-d38f-485c-886d-23101f0866ca uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240452025-03-07T23:30:51.650ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5206:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5234:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_subnet_list_network_interfaces::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SubnetPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalVpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e6025ab-d38f-485c-886d-23101f0866ca uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240462025-03-07T23:30:51.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1725 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2e6025ab-d38f-485c-886d-23101f0866ca response_code = 401 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240472025-03-07T23:30:51.650ZINFOtest_unauthorized (external client test context): client received response status = 401
240482025-03-07T23:30:51.650ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240492025-03-07T23:30:51.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240502025-03-07T23:30:51.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f675b392-ff67-48f8-a554-8dc560528cb1 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240512025-03-07T23:30:51.651ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f675b392-ff67-48f8-a554-8dc560528cb1 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240522025-03-07T23:30:51.651ZINFOtest_unauthorized (external client test context): client received response status = 405
240532025-03-07T23:30:51.651ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240542025-03-07T23:30:51.651ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240552025-03-07T23:30:51.651ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5d154391-1276-434b-ace9-6032e2f402d5 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240562025-03-07T23:30:51.651ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5d154391-1276-434b-ace9-6032e2f402d5 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240572025-03-07T23:30:51.652ZINFOtest_unauthorized (external client test context): client received response status = 405
240582025-03-07T23:30:51.652ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240592025-03-07T23:30:51.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240602025-03-07T23:30:51.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 99ea54dd-0d41-4fac-a30a-80cc8832cfd8 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240612025-03-07T23:30:51.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 99ea54dd-0d41-4fac-a30a-80cc8832cfd8 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240622025-03-07T23:30:51.652ZINFOtest_unauthorized (external client test context): client received response status = 405
240632025-03-07T23:30:51.652ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240642025-03-07T23:30:51.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240652025-03-07T23:30:51.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5814aef2-fbc2-4f19-a266-fb79add0bd50 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240662025-03-07T23:30:51.653ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5814aef2-fbc2-4f19-a266-fb79add0bd50 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240672025-03-07T23:30:51.653ZINFOtest_unauthorized (external client test context): client received response status = 405
240682025-03-07T23:30:51.653ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240692025-03-07T23:30:51.653ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240702025-03-07T23:30:51.653ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ffe460c8-e097-4cc8-a043-3b123056c171 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240712025-03-07T23:30:51.653ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ffe460c8-e097-4cc8-a043-3b123056c171 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240722025-03-07T23:30:51.654ZINFOtest_unauthorized (external client test context): client received response status = 405
240732025-03-07T23:30:51.654ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240742025-03-07T23:30:51.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240752025-03-07T23:30:51.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9994e3d5-529f-4146-9934-f3bce3c8ec73 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240762025-03-07T23:30:51.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9994e3d5-529f-4146-9934-f3bce3c8ec73 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240772025-03-07T23:30:51.654ZINFOtest_unauthorized (external client test context): client received response status = 405
240782025-03-07T23:30:51.654ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240792025-03-07T23:30:51.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240802025-03-07T23:30:51.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 09b3531b-7399-47bf-8033-c32d2fa44d28 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240812025-03-07T23:30:51.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 09b3531b-7399-47bf-8033-c32d2fa44d28 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240822025-03-07T23:30:51.655ZINFOtest_unauthorized (external client test context): client received response status = 405
240832025-03-07T23:30:51.655ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240842025-03-07T23:30:51.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240852025-03-07T23:30:51.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d7836f3f-a2b5-46fb-a9cd-560a8fe642de uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240862025-03-07T23:30:51.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d7836f3f-a2b5-46fb-a9cd-560a8fe642de response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240872025-03-07T23:30:51.655ZINFOtest_unauthorized (external client test context): client received response status = 405
240882025-03-07T23:30:51.655ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240892025-03-07T23:30:51.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240902025-03-07T23:30:51.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 06963f11-2229-457d-a611-3ae6caa50b46 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240912025-03-07T23:30:51.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 06963f11-2229-457d-a611-3ae6caa50b46 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240922025-03-07T23:30:51.656ZINFOtest_unauthorized (external client test context): client received response status = 405
240932025-03-07T23:30:51.656ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240942025-03-07T23:30:51.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240952025-03-07T23:30:51.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 67d66bbf-e5c8-4213-86dc-5670f006e0c6 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240962025-03-07T23:30:51.656ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 67d66bbf-e5c8-4213-86dc-5670f006e0c6 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240972025-03-07T23:30:51.656ZINFOtest_unauthorized (external client test context): client received response status = 405
240982025-03-07T23:30:51.656ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
240992025-03-07T23:30:51.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241002025-03-07T23:30:51.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 78ff2cec-8793-451d-b908-f36d4e9019a5 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241012025-03-07T23:30:51.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 78ff2cec-8793-451d-b908-f36d4e9019a5 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241022025-03-07T23:30:51.657ZINFOtest_unauthorized (external client test context): client received response status = 405
241032025-03-07T23:30:51.657ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241042025-03-07T23:30:51.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241052025-03-07T23:30:51.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 072892b3-57b0-4642-875f-819731f4b238 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241062025-03-07T23:30:51.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 072892b3-57b0-4642-875f-819731f4b238 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241072025-03-07T23:30:51.657ZINFOtest_unauthorized (external client test context): client received response status = 405
241082025-03-07T23:30:51.657ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241092025-03-07T23:30:51.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241102025-03-07T23:30:51.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cfa2e7fd-a27d-4241-98bd-e6b9090db53f uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241112025-03-07T23:30:51.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = cfa2e7fd-a27d-4241-98bd-e6b9090db53f response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241122025-03-07T23:30:51.658ZINFOtest_unauthorized (external client test context): client received response status = 405
241132025-03-07T23:30:51.658ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241142025-03-07T23:30:51.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241152025-03-07T23:30:51.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 29834319-e1bc-484f-b86b-2013bd5a2cb0 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241162025-03-07T23:30:51.658ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 29834319-e1bc-484f-b86b-2013bd5a2cb0 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241172025-03-07T23:30:51.658ZINFOtest_unauthorized (external client test context): client received response status = 405
241182025-03-07T23:30:51.658ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241192025-03-07T23:30:51.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241202025-03-07T23:30:51.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 40b501d6-2679-47d7-b6a4-5faf07b4e2cc uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241212025-03-07T23:30:51.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 40b501d6-2679-47d7-b6a4-5faf07b4e2cc response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241222025-03-07T23:30:51.659ZINFOtest_unauthorized (external client test context): client received response status = 405
241232025-03-07T23:30:51.659ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241242025-03-07T23:30:51.659ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241252025-03-07T23:30:51.659ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8e23b289-778f-482b-9b12-56ddfaba4d70 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241262025-03-07T23:30:51.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8e23b289-778f-482b-9b12-56ddfaba4d70 response_code = 405 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241272025-03-07T23:30:51.659ZINFOtest_unauthorized (external client test context): client received response status = 405
241282025-03-07T23:30:51.659ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241292025-03-07T23:30:51.659ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241302025-03-07T23:30:51.660ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241312025-03-07T23:30:51.660ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241322025-03-07T23:30:51.660ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241332025-03-07T23:30:51.660ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241342025-03-07T23:30:51.660ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241352025-03-07T23:30:51.661ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241362025-03-07T23:30:51.664ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241372025-03-07T23:30:51.664ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241382025-03-07T23:30:51.665ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241392025-03-07T23:30:51.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
241402025-03-07T23:30:51.672ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
241412025-03-07T23:30:51.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241422025-03-07T23:30:51.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241432025-03-07T23:30:51.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241442025-03-07T23:30:51.681ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
241452025-03-07T23:30:51.681ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241462025-03-07T23:30:51.681ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241472025-03-07T23:30:51.682ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241482025-03-07T23:30:51.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
241492025-03-07T23:30:51.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
241502025-03-07T23:30:51.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241512025-03-07T23:30:51.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241522025-03-07T23:30:51.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241532025-03-07T23:30:51.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
241542025-03-07T23:30:51.698ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
241552025-03-07T23:30:51.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241562025-03-07T23:30:51.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241572025-03-07T23:30:51.699ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241582025-03-07T23:30:51.702ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
241592025-03-07T23:30:51.702ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
241602025-03-07T23:30:51.702ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
241612025-03-07T23:30:51.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
241622025-03-07T23:30:51.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
241632025-03-07T23:30:51.712ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
241642025-03-07T23:30:51.712ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241652025-03-07T23:30:51.712ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241662025-03-07T23:30:51.712ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241672025-03-07T23:30:51.712ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241682025-03-07T23:30:51.716ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241692025-03-07T23:30:51.716ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241702025-03-07T23:30:51.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241712025-03-07T23:30:51.723ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241722025-03-07T23:30:51.723ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241732025-03-07T23:30:51.724ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241742025-03-07T23:30:51.729ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241752025-03-07T23:30:51.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241762025-03-07T23:30:51.730ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241772025-03-07T23:30:51.733ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241782025-03-07T23:30:51.733ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241792025-03-07T23:30:51.733ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241802025-03-07T23:30:51.733ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241812025-03-07T23:30:51.734ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241822025-03-07T23:30:51.740ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241832025-03-07T23:30:51.740ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241842025-03-07T23:30:51.740ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241852025-03-07T23:30:51.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241862025-03-07T23:30:51.754ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241872025-03-07T23:30:51.754ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241882025-03-07T23:30:51.754ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241892025-03-07T23:30:51.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241902025-03-07T23:30:51.767ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241912025-03-07T23:30:51.778ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241922025-03-07T23:30:51.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241932025-03-07T23:30:51.778ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241942025-03-07T23:30:51.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241952025-03-07T23:30:51.778ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241962025-03-07T23:30:51.779ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241972025-03-07T23:30:51.792ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241982025-03-07T23:30:51.792ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
241992025-03-07T23:30:51.792ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242002025-03-07T23:30:51.793ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242012025-03-07T23:30:51.796ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242022025-03-07T23:30:51.796ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242032025-03-07T23:30:51.796ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242042025-03-07T23:30:51.797ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242052025-03-07T23:30:51.814ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242062025-03-07T23:30:51.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 7fee65c7-bcd5-4732-821c-3270734c2cf8, lookup_type: ByName("demo-vpc-subnet") } result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242072025-03-07T23:30:51.830ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242082025-03-07T23:30:51.830ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d roles = RoleSet { roles: {} } uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242092025-03-07T23:30:51.831ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d resource = Database result = Ok(()) uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242102025-03-07T23:30:51.840ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 179872 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69c444c9-4c1e-46b0-a830-3410238a5b4d response_code = 200 uri = /v1/vpc-subnets/demo-vpc-subnet/network-interfaces?project=demo-project&vpc=demo-vpc
242112025-03-07T23:30:51.841ZINFOtest_unauthorized (external client test context): client received response status = 200
242122025-03-07T23:30:51.841ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242132025-03-07T23:30:51.841ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242142025-03-07T23:30:51.841ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
242152025-03-07T23:30:51.842ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242162025-03-07T23:30:51.845ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242172025-03-07T23:30:51.845ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242182025-03-07T23:30:51.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242192025-03-07T23:30:51.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242202025-03-07T23:30:51.847ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242212025-03-07T23:30:51.863ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242222025-03-07T23:30:51.863ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242232025-03-07T23:30:51.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242242025-03-07T23:30:51.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
242252025-03-07T23:30:51.897ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
242262025-03-07T23:30:51.897ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242272025-03-07T23:30:51.897ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242282025-03-07T23:30:51.899ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242292025-03-07T23:30:51.958ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
242302025-03-07T23:30:51.959ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242312025-03-07T23:30:51.959ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242322025-03-07T23:30:51.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242332025-03-07T23:30:51.964ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
242342025-03-07T23:30:51.968ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
242352025-03-07T23:30:51.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242362025-03-07T23:30:51.969ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242372025-03-07T23:30:51.969ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242382025-03-07T23:30:51.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
242392025-03-07T23:30:51.995ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
242402025-03-07T23:30:51.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242412025-03-07T23:30:51.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242422025-03-07T23:30:52.002ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242432025-03-07T23:30:52.010ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
242442025-03-07T23:30:52.010ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
242452025-03-07T23:30:52.010ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
242462025-03-07T23:30:52.011ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
242472025-03-07T23:30:52.016ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
242482025-03-07T23:30:52.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
242492025-03-07T23:30:52.029ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242502025-03-07T23:30:52.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242512025-03-07T23:30:52.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242522025-03-07T23:30:52.030ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242532025-03-07T23:30:52.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242542025-03-07T23:30:52.047ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242552025-03-07T23:30:52.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242562025-03-07T23:30:52.057ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242572025-03-07T23:30:52.057ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242582025-03-07T23:30:52.058ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242592025-03-07T23:30:52.080ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242602025-03-07T23:30:52.081ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242612025-03-07T23:30:52.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242622025-03-07T23:30:52.081ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242632025-03-07T23:30:52.082ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242642025-03-07T23:30:52.090ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242652025-03-07T23:30:52.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242662025-03-07T23:30:52.090ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242672025-03-07T23:30:52.091ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242682025-03-07T23:30:52.098ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242692025-03-07T23:30:52.100ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242702025-03-07T23:30:52.100ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242712025-03-07T23:30:52.106ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242722025-03-07T23:30:52.109ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242732025-03-07T23:30:52.117ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242742025-03-07T23:30:52.117ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242752025-03-07T23:30:52.117ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242762025-03-07T23:30:52.118ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242772025-03-07T23:30:52.118ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242782025-03-07T23:30:52.119ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242792025-03-07T23:30:52.126ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242802025-03-07T23:30:52.126ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242812025-03-07T23:30:52.126ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242822025-03-07T23:30:52.126ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242832025-03-07T23:30:52.133ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242842025-03-07T23:30:52.133ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242852025-03-07T23:30:52.133ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242862025-03-07T23:30:52.134ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242872025-03-07T23:30:52.141ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242882025-03-07T23:30:52.166ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242892025-03-07T23:30:52.166ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242902025-03-07T23:30:52.166ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242912025-03-07T23:30:52.166ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
242922025-03-07T23:30:52.167ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
242932025-03-07T23:30:52.167ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
242942025-03-07T23:30:52.167ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
242952025-03-07T23:30:52.167ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
242962025-03-07T23:30:52.167ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
242972025-03-07T23:30:52.167ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
242982025-03-07T23:30:52.167ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
242992025-03-07T23:30:52.167ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
243002025-03-07T23:30:52.167ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
243012025-03-07T23:30:52.168ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
243022025-03-07T23:30:52.172ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 330640 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d008853c-f5c6-4add-a2aa-06c35f46b1ca response_code = 200 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243032025-03-07T23:30:52.173ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
243042025-03-07T23:30:52.173ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
243052025-03-07T23:30:52.173ZINFOtest_unauthorized (external client test context): client received response status = 200
243062025-03-07T23:30:52.173ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243072025-03-07T23:30:52.174ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
243082025-03-07T23:30:52.174ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243092025-03-07T23:30:52.175ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243102025-03-07T23:30:52.175ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243112025-03-07T23:30:52.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243122025-03-07T23:30:52.175ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243132025-03-07T23:30:52.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243142025-03-07T23:30:52.178ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
243152025-03-07T23:30:52.179ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
243162025-03-07T23:30:52.188ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243172025-03-07T23:30:52.188ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243182025-03-07T23:30:52.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243192025-03-07T23:30:52.225ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
243202025-03-07T23:30:52.225ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
243212025-03-07T23:30:52.226ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243222025-03-07T23:30:52.226ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243232025-03-07T23:30:52.226ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243242025-03-07T23:30:52.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
243252025-03-07T23:30:52.247ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243262025-03-07T23:30:52.247ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243272025-03-07T23:30:52.271ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243282025-03-07T23:30:52.273ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
243292025-03-07T23:30:52.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
243302025-03-07T23:30:52.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
243312025-03-07T23:30:52.280ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243322025-03-07T23:30:52.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243332025-03-07T23:30:52.280ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243342025-03-07T23:30:52.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
243352025-03-07T23:30:52.283ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
243362025-03-07T23:30:52.283ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243372025-03-07T23:30:52.283ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243382025-03-07T23:30:52.283ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243392025-03-07T23:30:52.284ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
243402025-03-07T23:30:52.285ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
243412025-03-07T23:30:52.285ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
243422025-03-07T23:30:52.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
243432025-03-07T23:30:52.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
243442025-03-07T23:30:52.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
243452025-03-07T23:30:52.291ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243462025-03-07T23:30:52.291ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243472025-03-07T23:30:52.291ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243482025-03-07T23:30:52.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243492025-03-07T23:30:52.295ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243502025-03-07T23:30:52.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243512025-03-07T23:30:52.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243522025-03-07T23:30:52.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243532025-03-07T23:30:52.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243542025-03-07T23:30:52.298ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243552025-03-07T23:30:52.300ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243562025-03-07T23:30:52.300ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243572025-03-07T23:30:52.300ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243582025-03-07T23:30:52.300ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243592025-03-07T23:30:52.300ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243602025-03-07T23:30:52.303ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243612025-03-07T23:30:52.304ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243622025-03-07T23:30:52.304ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243632025-03-07T23:30:52.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243642025-03-07T23:30:52.307ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243652025-03-07T23:30:52.307ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243662025-03-07T23:30:52.307ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243672025-03-07T23:30:52.308ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243682025-03-07T23:30:52.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243692025-03-07T23:30:52.352ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243702025-03-07T23:30:52.354ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 179562 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 50a2e167-e0b0-46c9-a16c-5ff239996e1c response_code = 404 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243712025-03-07T23:30:52.355ZINFOtest_unauthorized (external client test context): client received response status = 404
243722025-03-07T23:30:52.355ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243732025-03-07T23:30:52.355ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
243742025-03-07T23:30:52.355ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbe25e8d-b7f9-42a2-a402-c9331676239e uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243752025-03-07T23:30:52.355ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbe25e8d-b7f9-42a2-a402-c9331676239e uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243762025-03-07T23:30:52.355ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbe25e8d-b7f9-42a2-a402-c9331676239e uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243772025-03-07T23:30:52.356ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbe25e8d-b7f9-42a2-a402-c9331676239e uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243782025-03-07T23:30:52.356ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 560 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbe25e8d-b7f9-42a2-a402-c9331676239e response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243792025-03-07T23:30:52.356ZINFOtest_unauthorized (external client test context): client received response status = 401
243802025-03-07T23:30:52.356ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243812025-03-07T23:30:52.356ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
243822025-03-07T23:30:52.357ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bc407cd-ddaa-4350-93d8-23bb1947d3e1 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243832025-03-07T23:30:52.357ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bc407cd-ddaa-4350-93d8-23bb1947d3e1 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243842025-03-07T23:30:52.357ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bc407cd-ddaa-4350-93d8-23bb1947d3e1 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243852025-03-07T23:30:52.357ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 286 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8bc407cd-ddaa-4350-93d8-23bb1947d3e1 response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243862025-03-07T23:30:52.357ZINFOtest_unauthorized (external client test context): client received response status = 401
243872025-03-07T23:30:52.357ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243882025-03-07T23:30:52.357ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
243892025-03-07T23:30:52.358ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6bd46b62-6505-413a-a604-a1298d9f18a5 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243902025-03-07T23:30:52.358ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6bd46b62-6505-413a-a604-a1298d9f18a5 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243912025-03-07T23:30:52.360ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5307:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcRouter>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5331:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcRouter>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::VpcRouter>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6bd46b62-6505-413a-a604-a1298d9f18a5 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243922025-03-07T23:30:52.360ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2736 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6bd46b62-6505-413a-a604-a1298d9f18a5 response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243932025-03-07T23:30:52.361ZINFOtest_unauthorized (external client test context): client received response status = 401
243942025-03-07T23:30:52.361ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243952025-03-07T23:30:52.361ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
243962025-03-07T23:30:52.361ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fa37df45-177a-4ae6-9c4b-b431e2ba0351 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243972025-03-07T23:30:52.361ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fa37df45-177a-4ae6-9c4b-b431e2ba0351 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
243982025-03-07T23:30:52.362ZINFOtest_unauthorized (external client test context): client received response status = 405
243992025-03-07T23:30:52.362ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244002025-03-07T23:30:52.362ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244012025-03-07T23:30:52.362ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 211eca86-9b1c-41ea-94d3-dcaf73f5ba9e uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244022025-03-07T23:30:52.362ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 211eca86-9b1c-41ea-94d3-dcaf73f5ba9e response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244032025-03-07T23:30:52.362ZINFOtest_unauthorized (external client test context): client received response status = 405
244042025-03-07T23:30:52.362ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244052025-03-07T23:30:52.362ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244062025-03-07T23:30:52.362ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e3466335-9209-4c7c-9679-36950d58929d uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244072025-03-07T23:30:52.362ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e3466335-9209-4c7c-9679-36950d58929d response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244082025-03-07T23:30:52.363ZINFOtest_unauthorized (external client test context): client received response status = 405
244092025-03-07T23:30:52.363ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244102025-03-07T23:30:52.363ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244112025-03-07T23:30:52.363ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f66a569-9627-4cdf-aa49-8e77689383ca uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244122025-03-07T23:30:52.363ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 261 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f66a569-9627-4cdf-aa49-8e77689383ca response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244132025-03-07T23:30:52.363ZINFOtest_unauthorized (external client test context): client received response status = 405
244142025-03-07T23:30:52.364ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244152025-03-07T23:30:52.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244162025-03-07T23:30:52.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244172025-03-07T23:30:52.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244182025-03-07T23:30:52.364ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244192025-03-07T23:30:52.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244202025-03-07T23:30:52.364ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244212025-03-07T23:30:52.365ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244222025-03-07T23:30:52.368ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244232025-03-07T23:30:52.368ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244242025-03-07T23:30:52.369ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244252025-03-07T23:30:52.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
244262025-03-07T23:30:52.372ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
244272025-03-07T23:30:52.372ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244282025-03-07T23:30:52.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244292025-03-07T23:30:52.373ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244302025-03-07T23:30:52.376ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
244312025-03-07T23:30:52.376ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244322025-03-07T23:30:52.376ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244332025-03-07T23:30:52.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244342025-03-07T23:30:52.381ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
244352025-03-07T23:30:52.384ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
244362025-03-07T23:30:52.384ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244372025-03-07T23:30:52.384ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244382025-03-07T23:30:52.385ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244392025-03-07T23:30:52.388ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
244402025-03-07T23:30:52.388ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
244412025-03-07T23:30:52.388ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244422025-03-07T23:30:52.388ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244432025-03-07T23:30:52.389ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244442025-03-07T23:30:52.392ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
244452025-03-07T23:30:52.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
244462025-03-07T23:30:52.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
244472025-03-07T23:30:52.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
244482025-03-07T23:30:52.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
244492025-03-07T23:30:52.402ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
244502025-03-07T23:30:52.402ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244512025-03-07T23:30:52.402ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244522025-03-07T23:30:52.402ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244532025-03-07T23:30:52.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244542025-03-07T23:30:52.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244552025-03-07T23:30:52.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244562025-03-07T23:30:52.410ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244572025-03-07T23:30:52.412ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244582025-03-07T23:30:52.412ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244592025-03-07T23:30:52.413ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244602025-03-07T23:30:52.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244612025-03-07T23:30:52.415ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244622025-03-07T23:30:52.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244632025-03-07T23:30:52.415ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244642025-03-07T23:30:52.416ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244652025-03-07T23:30:52.420ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244662025-03-07T23:30:52.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244672025-03-07T23:30:52.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244682025-03-07T23:30:52.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244692025-03-07T23:30:52.425ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244702025-03-07T23:30:52.425ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244712025-03-07T23:30:52.425ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244722025-03-07T23:30:52.425ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244732025-03-07T23:30:52.431ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244742025-03-07T23:30:52.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244752025-03-07T23:30:52.457ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 93364 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a17204c2-21a3-44f8-845b-cf54eded8b88 response_code = 404 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244762025-03-07T23:30:52.458ZINFOtest_unauthorized (external client test context): client received response status = 404
244772025-03-07T23:30:52.458ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244782025-03-07T23:30:52.458ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244792025-03-07T23:30:52.459ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d83303b9-42be-405b-8fdb-71dda38d56ff uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244802025-03-07T23:30:52.459ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d83303b9-42be-405b-8fdb-71dda38d56ff uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244812025-03-07T23:30:52.459ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d83303b9-42be-405b-8fdb-71dda38d56ff uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244822025-03-07T23:30:52.459ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d83303b9-42be-405b-8fdb-71dda38d56ff uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244832025-03-07T23:30:52.460ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1087 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d83303b9-42be-405b-8fdb-71dda38d56ff response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244842025-03-07T23:30:52.460ZINFOtest_unauthorized (external client test context): client received response status = 401
244852025-03-07T23:30:52.460ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244862025-03-07T23:30:52.460ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244872025-03-07T23:30:52.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 934216e3-ff9c-4823-b5f2-356105863138 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244882025-03-07T23:30:52.461ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 934216e3-ff9c-4823-b5f2-356105863138 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244892025-03-07T23:30:52.461ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 934216e3-ff9c-4823-b5f2-356105863138 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244902025-03-07T23:30:52.461ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 503 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 934216e3-ff9c-4823-b5f2-356105863138 response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244912025-03-07T23:30:52.461ZINFOtest_unauthorized (external client test context): client received response status = 401
244922025-03-07T23:30:52.462ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244932025-03-07T23:30:52.462ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
244942025-03-07T23:30:52.462ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9691325e-7b21-41fb-a567-e30f9f264988 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244952025-03-07T23:30:52.463ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9691325e-7b21-41fb-a567-e30f9f264988 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244962025-03-07T23:30:52.465ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5375:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcRouter>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5391:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcRouter>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::VpcRouter>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9691325e-7b21-41fb-a567-e30f9f264988 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244972025-03-07T23:30:52.465ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2515 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9691325e-7b21-41fb-a567-e30f9f264988 response_code = 401 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
244982025-03-07T23:30:52.467ZINFOtest_unauthorized (external client test context): client received response status = 401
244992025-03-07T23:30:52.467ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245002025-03-07T23:30:52.467ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245012025-03-07T23:30:52.468ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4182b935-1bc5-40bf-8022-9163efd7a609 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245022025-03-07T23:30:52.468ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4182b935-1bc5-40bf-8022-9163efd7a609 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245032025-03-07T23:30:52.469ZINFOtest_unauthorized (external client test context): client received response status = 405
245042025-03-07T23:30:52.469ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245052025-03-07T23:30:52.469ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245062025-03-07T23:30:52.470ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 21fb8615-aa7f-4e0d-b1de-c3f08595f395 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245072025-03-07T23:30:52.470ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 185 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 21fb8615-aa7f-4e0d-b1de-c3f08595f395 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245082025-03-07T23:30:52.470ZINFOtest_unauthorized (external client test context): client received response status = 405
245092025-03-07T23:30:52.470ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245102025-03-07T23:30:52.470ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245112025-03-07T23:30:52.470ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dfce86db-5b28-4823-a659-f839b2dba1dc uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245122025-03-07T23:30:52.470ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dfce86db-5b28-4823-a659-f839b2dba1dc response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245132025-03-07T23:30:52.471ZINFOtest_unauthorized (external client test context): client received response status = 405
245142025-03-07T23:30:52.471ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245152025-03-07T23:30:52.472ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245162025-03-07T23:30:52.472ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ad3cbea1-e9b9-4569-a049-7c5672a6a530 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245172025-03-07T23:30:52.472ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ad3cbea1-e9b9-4569-a049-7c5672a6a530 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245182025-03-07T23:30:52.472ZINFOtest_unauthorized (external client test context): client received response status = 405
245192025-03-07T23:30:52.472ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245202025-03-07T23:30:52.472ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245212025-03-07T23:30:52.472ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b957eea3-0913-44fd-b7ac-51695b3643f6 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245222025-03-07T23:30:52.472ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 179 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b957eea3-0913-44fd-b7ac-51695b3643f6 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245232025-03-07T23:30:52.473ZINFOtest_unauthorized (external client test context): client received response status = 405
245242025-03-07T23:30:52.473ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245252025-03-07T23:30:52.473ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245262025-03-07T23:30:52.473ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a2d783f4-604e-4bcb-b3d5-da331aa87560 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245272025-03-07T23:30:52.473ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a2d783f4-604e-4bcb-b3d5-da331aa87560 response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245282025-03-07T23:30:52.473ZINFOtest_unauthorized (external client test context): client received response status = 405
245292025-03-07T23:30:52.473ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245302025-03-07T23:30:52.473ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245312025-03-07T23:30:52.473ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d26b1aed-56e1-4b2a-9567-f8d50f8961fb uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245322025-03-07T23:30:52.473ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d26b1aed-56e1-4b2a-9567-f8d50f8961fb response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245332025-03-07T23:30:52.474ZINFOtest_unauthorized (external client test context): client received response status = 405
245342025-03-07T23:30:52.474ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245352025-03-07T23:30:52.474ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245362025-03-07T23:30:52.474ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a8acd969-51ac-45fd-be24-32d6328848eb uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245372025-03-07T23:30:52.474ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a8acd969-51ac-45fd-be24-32d6328848eb response_code = 405 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245382025-03-07T23:30:52.475ZINFOtest_unauthorized (external client test context): client received response status = 405
245392025-03-07T23:30:52.475ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245402025-03-07T23:30:52.475ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers?project=demo-project&vpc=demo-vpc
245412025-03-07T23:30:52.475ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245422025-03-07T23:30:52.475ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245432025-03-07T23:30:52.475ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245442025-03-07T23:30:52.475ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245452025-03-07T23:30:52.475ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245462025-03-07T23:30:52.476ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245472025-03-07T23:30:52.478ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245482025-03-07T23:30:52.478ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245492025-03-07T23:30:52.478ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245502025-03-07T23:30:52.485ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
245512025-03-07T23:30:52.485ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
245522025-03-07T23:30:52.485ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245532025-03-07T23:30:52.485ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245542025-03-07T23:30:52.486ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245552025-03-07T23:30:52.489ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
245562025-03-07T23:30:52.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245572025-03-07T23:30:52.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245582025-03-07T23:30:52.490ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245592025-03-07T23:30:52.503ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
245602025-03-07T23:30:52.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
245612025-03-07T23:30:52.509ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245622025-03-07T23:30:52.509ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245632025-03-07T23:30:52.510ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245642025-03-07T23:30:52.514ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
245652025-03-07T23:30:52.514ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
245662025-03-07T23:30:52.514ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245672025-03-07T23:30:52.514ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245682025-03-07T23:30:52.515ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245692025-03-07T23:30:52.524ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
245702025-03-07T23:30:52.524ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
245712025-03-07T23:30:52.524ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
245722025-03-07T23:30:52.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
245732025-03-07T23:30:52.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
245742025-03-07T23:30:52.535ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
245752025-03-07T23:30:52.535ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245762025-03-07T23:30:52.535ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245772025-03-07T23:30:52.536ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245782025-03-07T23:30:52.536ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245792025-03-07T23:30:52.540ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245802025-03-07T23:30:52.540ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245812025-03-07T23:30:52.540ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245822025-03-07T23:30:52.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245832025-03-07T23:30:52.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245842025-03-07T23:30:52.554ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245852025-03-07T23:30:52.561ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245862025-03-07T23:30:52.561ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245872025-03-07T23:30:52.561ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245882025-03-07T23:30:52.561ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245892025-03-07T23:30:52.562ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245902025-03-07T23:30:52.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245912025-03-07T23:30:52.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245922025-03-07T23:30:52.565ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245932025-03-07T23:30:52.566ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245942025-03-07T23:30:52.566ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245952025-03-07T23:30:52.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
245962025-03-07T23:30:52.575ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245972025-03-07T23:30:52.575ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245982025-03-07T23:30:52.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
245992025-03-07T23:30:52.575ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246002025-03-07T23:30:52.578ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246012025-03-07T23:30:52.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246022025-03-07T23:30:52.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246032025-03-07T23:30:52.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246042025-03-07T23:30:52.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246052025-03-07T23:30:52.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246062025-03-07T23:30:52.604ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246072025-03-07T23:30:52.604ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246082025-03-07T23:30:52.604ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246092025-03-07T23:30:52.605ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246102025-03-07T23:30:52.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246112025-03-07T23:30:52.610ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246122025-03-07T23:30:52.610ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246132025-03-07T23:30:52.610ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246142025-03-07T23:30:52.612ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246152025-03-07T23:30:52.617ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246162025-03-07T23:30:52.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246172025-03-07T23:30:52.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246182025-03-07T23:30:52.619ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246192025-03-07T23:30:52.623ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246202025-03-07T23:30:52.636ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246212025-03-07T23:30:52.636ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246222025-03-07T23:30:52.636ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d roles = RoleSet { roles: {} } uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246232025-03-07T23:30:52.637ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d resource = Database result = Ok(()) uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246242025-03-07T23:30:52.640ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 165360 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = db40e6e9-6717-464f-af87-52fa67eadb6d response_code = 200 uri = /v1/vpc-routers?project=demo-project&vpc=demo-vpc
246252025-03-07T23:30:52.641ZINFOtest_unauthorized (external client test context): client received response status = 200
246262025-03-07T23:30:52.641ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246272025-03-07T23:30:52.641ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246282025-03-07T23:30:52.641ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246292025-03-07T23:30:52.641ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246302025-03-07T23:30:52.642ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246312025-03-07T23:30:52.642ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246322025-03-07T23:30:52.642ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246332025-03-07T23:30:52.642ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246342025-03-07T23:30:52.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246352025-03-07T23:30:52.645ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246362025-03-07T23:30:52.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246372025-03-07T23:30:52.645ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246382025-03-07T23:30:52.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
246392025-03-07T23:30:52.655ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
246402025-03-07T23:30:52.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246412025-03-07T23:30:52.655ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246422025-03-07T23:30:52.656ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246432025-03-07T23:30:52.663ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
246442025-03-07T23:30:52.663ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246452025-03-07T23:30:52.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246462025-03-07T23:30:52.664ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246472025-03-07T23:30:52.677ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
246482025-03-07T23:30:52.682ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
246492025-03-07T23:30:52.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246502025-03-07T23:30:52.682ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246512025-03-07T23:30:52.687ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246522025-03-07T23:30:52.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
246532025-03-07T23:30:52.690ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
246542025-03-07T23:30:52.690ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246552025-03-07T23:30:52.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246562025-03-07T23:30:52.691ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246572025-03-07T23:30:52.694ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
246582025-03-07T23:30:52.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246592025-03-07T23:30:52.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
246602025-03-07T23:30:52.695ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
246612025-03-07T23:30:52.697ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
246622025-03-07T23:30:52.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
246632025-03-07T23:30:52.701ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246642025-03-07T23:30:52.701ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246652025-03-07T23:30:52.701ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246662025-03-07T23:30:52.701ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246672025-03-07T23:30:52.708ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246682025-03-07T23:30:52.708ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246692025-03-07T23:30:52.709ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246702025-03-07T23:30:52.713ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246712025-03-07T23:30:52.713ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246722025-03-07T23:30:52.716ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246732025-03-07T23:30:52.719ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246742025-03-07T23:30:52.719ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246752025-03-07T23:30:52.721ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246762025-03-07T23:30:52.724ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246772025-03-07T23:30:52.724ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246782025-03-07T23:30:52.724ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246792025-03-07T23:30:52.724ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246802025-03-07T23:30:52.725ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246812025-03-07T23:30:52.728ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246822025-03-07T23:30:52.728ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246832025-03-07T23:30:52.728ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246842025-03-07T23:30:52.729ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246852025-03-07T23:30:52.732ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246862025-03-07T23:30:52.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246872025-03-07T23:30:52.733ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246882025-03-07T23:30:52.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246892025-03-07T23:30:52.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246902025-03-07T23:30:52.755ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246912025-03-07T23:30:52.755ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 113768 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7a586ddb-6fef-4445-85da-d06297d87486 response_code = 200 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246922025-03-07T23:30:52.756ZINFOtest_unauthorized (external client test context): client received response status = 200
246932025-03-07T23:30:52.756ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246942025-03-07T23:30:52.756ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246952025-03-07T23:30:52.757ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246962025-03-07T23:30:52.757ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246972025-03-07T23:30:52.757ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
246982025-03-07T23:30:52.758ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
246992025-03-07T23:30:52.758ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247002025-03-07T23:30:52.762ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247012025-03-07T23:30:52.773ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247022025-03-07T23:30:52.773ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247032025-03-07T23:30:52.774ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247042025-03-07T23:30:52.780ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
247052025-03-07T23:30:52.780ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
247062025-03-07T23:30:52.780ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247072025-03-07T23:30:52.780ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247082025-03-07T23:30:52.781ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247092025-03-07T23:30:52.791ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
247102025-03-07T23:30:52.791ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247112025-03-07T23:30:52.791ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247122025-03-07T23:30:52.791ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247132025-03-07T23:30:52.798ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
247142025-03-07T23:30:52.803ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
247152025-03-07T23:30:52.803ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247162025-03-07T23:30:52.803ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247172025-03-07T23:30:52.804ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247182025-03-07T23:30:52.813ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
247192025-03-07T23:30:52.813ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
247202025-03-07T23:30:52.813ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247212025-03-07T23:30:52.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247222025-03-07T23:30:52.813ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247232025-03-07T23:30:52.816ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
247242025-03-07T23:30:52.816ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247252025-03-07T23:30:52.816ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247262025-03-07T23:30:52.816ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247272025-03-07T23:30:52.822ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
247282025-03-07T23:30:52.836ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
247292025-03-07T23:30:52.837ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247302025-03-07T23:30:52.837ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247312025-03-07T23:30:52.837ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247322025-03-07T23:30:52.837ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247332025-03-07T23:30:52.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247342025-03-07T23:30:52.840ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247352025-03-07T23:30:52.842ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247362025-03-07T23:30:52.845ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247372025-03-07T23:30:52.847ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247382025-03-07T23:30:52.848ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247392025-03-07T23:30:52.876ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247402025-03-07T23:30:52.878ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247412025-03-07T23:30:52.879ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247422025-03-07T23:30:52.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247432025-03-07T23:30:52.885ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247442025-03-07T23:30:52.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247452025-03-07T23:30:52.885ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247462025-03-07T23:30:52.886ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247472025-03-07T23:30:52.893ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247482025-03-07T23:30:52.893ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247492025-03-07T23:30:52.893ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247502025-03-07T23:30:52.894ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247512025-03-07T23:30:52.898ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247522025-03-07T23:30:52.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247532025-03-07T23:30:52.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247542025-03-07T23:30:52.899ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247552025-03-07T23:30:52.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247562025-03-07T23:30:52.923ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247572025-03-07T23:30:52.923ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 165988 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1e03671-cb4d-499c-ac05-414302a86eee response_code = 404 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247582025-03-07T23:30:52.925ZINFOtest_unauthorized (external client test context): client received response status = 404
247592025-03-07T23:30:52.925ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247602025-03-07T23:30:52.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247612025-03-07T23:30:52.925ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74bd3830-1006-4d61-b72d-2a3fa1236d1e uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247622025-03-07T23:30:52.925ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74bd3830-1006-4d61-b72d-2a3fa1236d1e uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247632025-03-07T23:30:52.925ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74bd3830-1006-4d61-b72d-2a3fa1236d1e uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247642025-03-07T23:30:52.925ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74bd3830-1006-4d61-b72d-2a3fa1236d1e uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247652025-03-07T23:30:52.925ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 282 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74bd3830-1006-4d61-b72d-2a3fa1236d1e response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247662025-03-07T23:30:52.925ZINFOtest_unauthorized (external client test context): client received response status = 401
247672025-03-07T23:30:52.925ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247682025-03-07T23:30:52.925ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247692025-03-07T23:30:52.926ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74704ab5-4709-4311-8a12-5adc6a772513 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247702025-03-07T23:30:52.926ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74704ab5-4709-4311-8a12-5adc6a772513 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247712025-03-07T23:30:52.926ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74704ab5-4709-4311-8a12-5adc6a772513 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247722025-03-07T23:30:52.926ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 175 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 74704ab5-4709-4311-8a12-5adc6a772513 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247732025-03-07T23:30:52.926ZINFOtest_unauthorized (external client test context): client received response status = 401
247742025-03-07T23:30:52.926ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247752025-03-07T23:30:52.926ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247762025-03-07T23:30:52.927ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcbb9bef-c2ab-4ceb-8ccd-f9e132d176a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247772025-03-07T23:30:52.927ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcbb9bef-c2ab-4ceb-8ccd-f9e132d176a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247782025-03-07T23:30:52.929ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5345:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5361:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcbb9bef-c2ab-4ceb-8ccd-f9e132d176a8 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247792025-03-07T23:30:52.929ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1598 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcbb9bef-c2ab-4ceb-8ccd-f9e132d176a8 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247802025-03-07T23:30:52.929ZINFOtest_unauthorized (external client test context): client received response status = 401
247812025-03-07T23:30:52.929ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247822025-03-07T23:30:52.929ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247832025-03-07T23:30:52.929ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247842025-03-07T23:30:52.929ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247852025-03-07T23:30:52.929ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
247862025-03-07T23:30:52.929ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247872025-03-07T23:30:52.929ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247882025-03-07T23:30:52.930ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247892025-03-07T23:30:52.934ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247902025-03-07T23:30:52.934ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247912025-03-07T23:30:52.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247922025-03-07T23:30:52.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
247932025-03-07T23:30:52.940ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
247942025-03-07T23:30:52.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247952025-03-07T23:30:52.940ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
247962025-03-07T23:30:52.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
247972025-03-07T23:30:52.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
247982025-03-07T23:30:52.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
247992025-03-07T23:30:52.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248002025-03-07T23:30:52.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248012025-03-07T23:30:52.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
248022025-03-07T23:30:52.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
248032025-03-07T23:30:52.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248042025-03-07T23:30:52.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248052025-03-07T23:30:52.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248062025-03-07T23:30:52.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
248072025-03-07T23:30:52.963ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
248082025-03-07T23:30:52.963ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248092025-03-07T23:30:52.963ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248102025-03-07T23:30:52.963ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248112025-03-07T23:30:52.968ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
248122025-03-07T23:30:52.968ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248132025-03-07T23:30:52.968ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248142025-03-07T23:30:52.968ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
248152025-03-07T23:30:52.972ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
248162025-03-07T23:30:52.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
248172025-03-07T23:30:52.976ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248182025-03-07T23:30:52.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248192025-03-07T23:30:52.976ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248202025-03-07T23:30:52.977ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248212025-03-07T23:30:52.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248222025-03-07T23:30:52.990ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248232025-03-07T23:30:52.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248242025-03-07T23:30:53.001ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248252025-03-07T23:30:53.001ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248262025-03-07T23:30:53.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248272025-03-07T23:30:53.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248282025-03-07T23:30:53.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248292025-03-07T23:30:53.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248302025-03-07T23:30:53.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248312025-03-07T23:30:53.009ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248322025-03-07T23:30:53.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248332025-03-07T23:30:53.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248342025-03-07T23:30:53.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248352025-03-07T23:30:53.012ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248362025-03-07T23:30:53.013ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248372025-03-07T23:30:53.013ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248382025-03-07T23:30:53.013ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248392025-03-07T23:30:53.017ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248402025-03-07T23:30:53.017ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248412025-03-07T23:30:53.017ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248422025-03-07T23:30:53.018ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248432025-03-07T23:30:53.021ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248442025-03-07T23:30:53.043ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248452025-03-07T23:30:53.043ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 114812 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 065ad1d4-24df-4218-bc00-c2b6b439af19 response_code = 404 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248462025-03-07T23:30:53.044ZINFOtest_unauthorized (external client test context): client received response status = 404
248472025-03-07T23:30:53.044ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248482025-03-07T23:30:53.044ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248492025-03-07T23:30:53.044ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 525b3b8d-b517-48be-9955-88151d8b2207 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248502025-03-07T23:30:53.045ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 525b3b8d-b517-48be-9955-88151d8b2207 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248512025-03-07T23:30:53.045ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 525b3b8d-b517-48be-9955-88151d8b2207 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248522025-03-07T23:30:53.045ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 525b3b8d-b517-48be-9955-88151d8b2207 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248532025-03-07T23:30:53.045ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 390 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 525b3b8d-b517-48be-9955-88151d8b2207 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248542025-03-07T23:30:53.045ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
248552025-03-07T23:30:53.045ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
248562025-03-07T23:30:53.045ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
248572025-03-07T23:30:53.045ZINFOtest_unauthorized (external client test context): client received response status = 401
248582025-03-07T23:30:53.045ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248592025-03-07T23:30:53.045ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248602025-03-07T23:30:53.046ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 47e4efad-0bff-49c9-831c-ecb1c595a5a1 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248612025-03-07T23:30:53.046ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 47e4efad-0bff-49c9-831c-ecb1c595a5a1 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248622025-03-07T23:30:53.046ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 47e4efad-0bff-49c9-831c-ecb1c595a5a1 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248632025-03-07T23:30:53.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 278 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 47e4efad-0bff-49c9-831c-ecb1c595a5a1 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248642025-03-07T23:30:53.047ZINFOtest_unauthorized (external client test context): client received response status = 401
248652025-03-07T23:30:53.047ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248662025-03-07T23:30:53.047ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248672025-03-07T23:30:53.047ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7c8fd709-3c3e-4a0e-b3a0-576959cb5acd uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248682025-03-07T23:30:53.047ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7c8fd709-3c3e-4a0e-b3a0-576959cb5acd uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248692025-03-07T23:30:53.048ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5436:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5453:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::VpcRouterUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::VpcRouter>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7c8fd709-3c3e-4a0e-b3a0-576959cb5acd uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248702025-03-07T23:30:53.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1043 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7c8fd709-3c3e-4a0e-b3a0-576959cb5acd response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248712025-03-07T23:30:53.048ZINFOtest_unauthorized (external client test context): client received response status = 401
248722025-03-07T23:30:53.048ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248732025-03-07T23:30:53.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248742025-03-07T23:30:53.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06110f3a-50d3-41b8-b6a3-bc60f020d100 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248752025-03-07T23:30:53.048ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 06110f3a-50d3-41b8-b6a3-bc60f020d100 response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248762025-03-07T23:30:53.048ZINFOtest_unauthorized (external client test context): client received response status = 405
248772025-03-07T23:30:53.048ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248782025-03-07T23:30:53.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248792025-03-07T23:30:53.049ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1aa963a2-bce7-45a7-b175-137c63418d8f uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248802025-03-07T23:30:53.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1aa963a2-bce7-45a7-b175-137c63418d8f response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248812025-03-07T23:30:53.050ZINFOtest_unauthorized (external client test context): client received response status = 405
248822025-03-07T23:30:53.050ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248832025-03-07T23:30:53.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248842025-03-07T23:30:53.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 22578534-5b67-4254-a179-498588e2559d uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248852025-03-07T23:30:53.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 22578534-5b67-4254-a179-498588e2559d response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248862025-03-07T23:30:53.050ZINFOtest_unauthorized (external client test context): client received response status = 405
248872025-03-07T23:30:53.050ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248882025-03-07T23:30:53.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248892025-03-07T23:30:53.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1ec79ba5-6c88-4271-b280-17c4f61ceba5 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248902025-03-07T23:30:53.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1ec79ba5-6c88-4271-b280-17c4f61ceba5 response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248912025-03-07T23:30:53.050ZINFOtest_unauthorized (external client test context): client received response status = 405
248922025-03-07T23:30:53.050ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248932025-03-07T23:30:53.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248942025-03-07T23:30:53.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248952025-03-07T23:30:53.050ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248962025-03-07T23:30:53.050ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
248972025-03-07T23:30:53.050ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
248982025-03-07T23:30:53.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
248992025-03-07T23:30:53.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249002025-03-07T23:30:53.068ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249012025-03-07T23:30:53.068ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249022025-03-07T23:30:53.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249032025-03-07T23:30:53.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
249042025-03-07T23:30:53.087ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
249052025-03-07T23:30:53.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249062025-03-07T23:30:53.087ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249072025-03-07T23:30:53.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249082025-03-07T23:30:53.091ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
249092025-03-07T23:30:53.091ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249102025-03-07T23:30:53.091ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249112025-03-07T23:30:53.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249122025-03-07T23:30:53.093ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
249132025-03-07T23:30:53.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
249142025-03-07T23:30:53.097ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249152025-03-07T23:30:53.097ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249162025-03-07T23:30:53.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249172025-03-07T23:30:53.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
249182025-03-07T23:30:53.100ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
249192025-03-07T23:30:53.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249202025-03-07T23:30:53.100ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249212025-03-07T23:30:53.100ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249222025-03-07T23:30:53.105ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
249232025-03-07T23:30:53.105ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
249242025-03-07T23:30:53.105ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
249252025-03-07T23:30:53.106ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
249262025-03-07T23:30:53.108ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
249272025-03-07T23:30:53.117ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
249282025-03-07T23:30:53.117ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249292025-03-07T23:30:53.118ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249302025-03-07T23:30:53.118ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249312025-03-07T23:30:53.118ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249322025-03-07T23:30:53.135ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249332025-03-07T23:30:53.136ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249342025-03-07T23:30:53.142ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249352025-03-07T23:30:53.145ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249362025-03-07T23:30:53.145ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249372025-03-07T23:30:53.145ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249382025-03-07T23:30:53.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249392025-03-07T23:30:53.147ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249402025-03-07T23:30:53.147ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249412025-03-07T23:30:53.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249422025-03-07T23:30:53.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249432025-03-07T23:30:53.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249442025-03-07T23:30:53.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249452025-03-07T23:30:53.153ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249462025-03-07T23:30:53.158ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249472025-03-07T23:30:53.158ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249482025-03-07T23:30:53.160ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249492025-03-07T23:30:53.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249502025-03-07T23:30:53.161ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
249512025-03-07T23:30:53.161ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
249522025-03-07T23:30:53.161ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
249532025-03-07T23:30:53.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
249542025-03-07T23:30:53.167ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
249552025-03-07T23:30:53.167ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
249562025-03-07T23:30:53.167ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249572025-03-07T23:30:53.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249582025-03-07T23:30:53.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249592025-03-07T23:30:53.168ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249602025-03-07T23:30:53.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
249612025-03-07T23:30:53.171ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
249622025-03-07T23:30:53.191ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249632025-03-07T23:30:53.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249642025-03-07T23:30:53.238ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 188669 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 36d1d2c9-2c99-479c-ba24-61d172989065 response_code = 404 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
249652025-03-07T23:30:53.239ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 3 reason = Timeout
249662025-03-07T23:30:53.239ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
249672025-03-07T23:30:53.239ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
249682025-03-07T23:30:53.239ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
249692025-03-07T23:30:53.240ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
249702025-03-07T23:30:53.240ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 3 reason = Timeout
249712025-03-07T23:30:53.240ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
249722025-03-07T23:30:53.240ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 4 reason = Timeout
249732025-03-07T23:30:53.370ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:48967 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:48967] } uri = http://[::1]:48967/config
249742025-03-07T23:30:53.370ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 4 reason = Timeout
249752025-03-07T23:30:53.370ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
249762025-03-07T23:30:53.370ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
249772025-03-07T23:30:53.370ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
249782025-03-07T23:30:53.372ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
249792025-03-07T23:30:53.372ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 5 reason = Timeout
249802025-03-07T23:30:53.471ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:39729 generation = 3 method = PUT servers = DnsServersList { addresses: [[::1]:39729] } uri = http://[::1]:39729/config
249812025-03-07T23:30:53.471ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 3 reason = Timeout
249822025-03-07T23:30:53.472ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
249832025-03-07T23:30:53.472ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 2 reason = Timeout
249842025-03-07T23:30:53.472ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2025-03-07 23:20:53.472547853 UTC
249852025-03-07T23:30:53.472ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
249862025-03-07T23:30:53.472ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
249872025-03-07T23:30:53.473ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
249882025-03-07T23:30:53.473ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 5 reason = Timeout
249892025-03-07T23:30:53.473ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
249902025-03-07T23:30:53.473ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
249912025-03-07T23:30:53.473ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
249922025-03-07T23:30:53.473ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
249932025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
249942025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 2 reason = Timeout
249952025-03-07T23:30:53.474ZINFOtest_unauthorized (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
249962025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 82.112\u{b5}s iteration = 2 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
249972025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 10 reason = Timeout
249982025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 13.434\u{b5}s iteration = 10 status = {"error":"task disabled"}
249992025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 3 reason = Timeout
250002025-03-07T23:30:53.474ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
250012025-03-07T23:30:53.474ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
250022025-03-07T23:30:53.474ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
250032025-03-07T23:30:53.474ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
250042025-03-07T23:30:53.475ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
250052025-03-07T23:30:53.475ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement iteration = 2 reason = Timeout
250062025-03-07T23:30:53.475ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
250072025-03-07T23:30:53.475ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
250082025-03-07T23:30:53.475ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
250092025-03-07T23:30:53.475ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 3 reason = Timeout
250102025-03-07T23:30:53.475ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement_driver iteration = 2 reason = Timeout
250112025-03-07T23:30:53.476ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
250122025-03-07T23:30:53.476ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
250132025-03-07T23:30:53.476ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
250142025-03-07T23:30:53.476ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 2 reason = Timeout
250152025-03-07T23:30:53.476ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
250162025-03-07T23:30:53.476ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
250172025-03-07T23:30:53.476ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
250182025-03-07T23:30:53.477ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = lookup_region_port iteration = 2 reason = Timeout
250192025-03-07T23:30:53.477ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
250202025-03-07T23:30:53.477ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
250212025-03-07T23:30:53.477ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
250222025-03-07T23:30:53.477ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 2 reason = Timeout
250232025-03-07T23:30:53.477ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
250242025-03-07T23:30:53.477ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
250252025-03-07T23:30:53.478ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
250262025-03-07T23:30:53.478ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 2 reason = Timeout
250272025-03-07T23:30:53.478ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
250282025-03-07T23:30:53.478ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
250292025-03-07T23:30:53.478ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
250302025-03-07T23:30:53.478ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 2 reason = Timeout
250312025-03-07T23:30:53.478ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database
250322025-03-07T23:30:53.478ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
250332025-03-07T23:30:53.479ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
250342025-03-07T23:30:53.479ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 2 reason = Timeout
250352025-03-07T23:30:53.479ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
250362025-03-07T23:30:53.479ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
250372025-03-07T23:30:53.480ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
250382025-03-07T23:30:53.480ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 2 reason = Timeout
250392025-03-07T23:30:53.480ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database
250402025-03-07T23:30:53.481ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
250412025-03-07T23:30:53.481ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
250422025-03-07T23:30:53.481ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 4 reason = Timeout
250432025-03-07T23:30:53.481ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
250442025-03-07T23:30:53.481ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
250452025-03-07T23:30:53.482ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
250462025-03-07T23:30:53.482ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 3 reason = Timeout
250472025-03-07T23:30:53.482ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
250482025-03-07T23:30:53.482ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
250492025-03-07T23:30:53.482ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
250502025-03-07T23:30:53.482ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
250512025-03-07T23:30:53.483ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
250522025-03-07T23:30:53.483ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 3 reason = Timeout
250532025-03-07T23:30:53.483ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
250542025-03-07T23:30:53.483ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 49.273\u{b5}s iteration = 3 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
250552025-03-07T23:30:53.483ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 7 reason = Timeout
250562025-03-07T23:30:53.483ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
250572025-03-07T23:30:53.483ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
250582025-03-07T23:30:53.483ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
250592025-03-07T23:30:53.483ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
250602025-03-07T23:30:53.483ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
250612025-03-07T23:30:53.483ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
250622025-03-07T23:30:53.484ZINFOtest_unauthorized (external client test context): client received response status = 404
250632025-03-07T23:30:53.485ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
250642025-03-07T23:30:53.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
250652025-03-07T23:30:53.485ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:48967 remote_addr = [::1]:58048
250662025-03-07T23:30:53.485ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:39729 remote_addr = [::1]:64194
250672025-03-07T23:30:53.492ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
250682025-03-07T23:30:53.492ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
250692025-03-07T23:30:53.492ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
250702025-03-07T23:30:53.492ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
250712025-03-07T23:30:53.492ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
250722025-03-07T23:30:53.493ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
250732025-03-07T23:30:53.493ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
250742025-03-07T23:30:53.495ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
250752025-03-07T23:30:53.495ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
250762025-03-07T23:30:53.495ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
250772025-03-07T23:30:53.495ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
250782025-03-07T23:30:53.495ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
250792025-03-07T23:30:53.495ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
250802025-03-07T23:30:53.497ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b08529bc-89b9-4819-9c43-0cae270316cf uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
250812025-03-07T23:30:53.497ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76d454db-5ecd-4f35-875e-f0b1ac7aaa3a uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
250822025-03-07T23:30:53.497ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:48967 method = PUT remote_addr = [::1]:58048 req_id = 92130c3f-a3a6-44f9-830e-528a1bb6aa98 uri = /config
250832025-03-07T23:30:53.499ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:39729 method = PUT remote_addr = [::1]:64194 req_id = 0850336d-bacc-4c1d-9959-3e0581db1a20 uri = /config
250842025-03-07T23:30:53.500ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 55 93 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 U............_na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:64103 req_id = d3f95614-b79e-4135-9c38-3f87b750721c
250852025-03-07T23:30:53.500ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 21907,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64103 req_id = d3f95614-b79e-4135-9c38-3f87b750721c
250862025-03-07T23:30:53.500ZDEBGtest_unauthorized (store): query key key = _nameservice._tcp
250872025-03-07T23:30:53.500ZDEBGtest_unauthorized (store): query key key = c01c014b-4287-4af4-b66b-41095bf7841f.host
250882025-03-07T23:30:53.500ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:64103 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 48967, target: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal") })) }] req_id = d3f95614-b79e-4135-9c38-3f87b750721c
250892025-03-07T23:30:53.500ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 04 62 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .b..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:50385 req_id = 18fa63ea-738c-4208-b674-c8c35b31400b
250902025-03-07T23:30:53.500ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 1122,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50385 req_id = 18fa63ea-738c-4208-b674-c8c35b31400b
250912025-03-07T23:30:53.501ZDEBGtest_unauthorized (store): query key key = _external-dns._tcp
250922025-03-07T23:30:53.501ZDEBGtest_unauthorized (store): query key key = 2020e185-cc36-4881-9ae7-262f444268e3.host
250932025-03-07T23:30:53.501ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:50385 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39729, target: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal") })) }] req_id = 18fa63ea-738c-4208-b674-c8c35b31400b
250942025-03-07T23:30:53.501ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b08529bc-89b9-4819-9c43-0cae270316cf resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
250952025-03-07T23:30:53.501ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b08529bc-89b9-4819-9c43-0cae270316cf roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
250962025-03-07T23:30:53.502ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b08529bc-89b9-4819-9c43-0cae270316cf resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
250972025-03-07T23:30:53.502ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76d454db-5ecd-4f35-875e-f0b1ac7aaa3a uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
250982025-03-07T23:30:53.502ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76d454db-5ecd-4f35-875e-f0b1ac7aaa3a uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
250992025-03-07T23:30:53.502ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76d454db-5ecd-4f35-875e-f0b1ac7aaa3a uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251002025-03-07T23:30:53.503ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = 92130c3f-a3a6-44f9-830e-528a1bb6aa98
251012025-03-07T23:30:53.503ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = 92130c3f-a3a6-44f9-830e-528a1bb6aa98
251022025-03-07T23:30:53.503ZINFOtest_unauthorized (store): attempting generation update new_generation = 3 req_id = 0850336d-bacc-4c1d-9959-3e0581db1a20
251032025-03-07T23:30:53.503ZINFOtest_unauthorized (store): updated generation new_generation = 3 req_id = 0850336d-bacc-4c1d-9959-3e0581db1a20
251042025-03-07T23:30:53.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 6696 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76d454db-5ecd-4f35-875e-f0b1ac7aaa3a response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251052025-03-07T23:30:53.503ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 6633 local_addr = [::1]:48967 method = PUT remote_addr = [::1]:58048 req_id = 92130c3f-a3a6-44f9-830e-528a1bb6aa98 response_code = 204 uri = /config
251062025-03-07T23:30:53.504ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 3930 local_addr = [::1]:39729 method = PUT remote_addr = [::1]:64194 req_id = 0850336d-bacc-4c1d-9959-3e0581db1a20 response_code = 204 uri = /config
251072025-03-07T23:30:53.504ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 48967, target: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3950, tv_nsec: 51617755 } })
251082025-03-07T23:30:53.504ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
251092025-03-07T23:30:53.505ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39729, target: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 3950, tv_nsec: 51969574 } })
251102025-03-07T23:30:53.505ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
251112025-03-07T23:30:53.505ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:48967 generation = 1 result = Ok(Response { url: "http://[::1]:48967/config", status: 204, headers: {"x-request-id": "92130c3f-a3a6-44f9-830e-528a1bb6aa98", "date": "Fri, 07 Mar 2025 23:30:53 GMT"} }) servers = DnsServersList { addresses: [[::1]:48967] }
251122025-03-07T23:30:53.506ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:48967 generation = 1 servers = DnsServersList { addresses: [[::1]:48967] }
251132025-03-07T23:30:53.509ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:48967] }
251142025-03-07T23:30:53.509ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 269.071131ms iteration = 4 status = {"generation":1,"server_results":{"[::1]:48967":{"Ok":null}}}
251152025-03-07T23:30:53.509ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:39729 generation = 3 result = Ok(Response { url: "http://[::1]:39729/config", status: 204, headers: {"x-request-id": "0850336d-bacc-4c1d-9959-3e0581db1a20", "date": "Fri, 07 Mar 2025 23:30:53 GMT"} }) servers = DnsServersList { addresses: [[::1]:39729] }
251162025-03-07T23:30:53.509ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 3 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:39729 generation = 3 servers = DnsServersList { addresses: [[::1]:39729] }
251172025-03-07T23:30:53.514ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 3 servers = DnsServersList { addresses: [[::1]:39729] }
251182025-03-07T23:30:53.514ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 141.656766ms iteration = 5 status = {"generation":3,"server_results":{"[::1]:39729":{"Ok":null}}}
251192025-03-07T23:30:53.515ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2025-03-07 23:20:53.472547853 UTC pruned = {}
251202025-03-07T23:30:53.515ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 43.084674ms iteration = 2 status = {"expiration":"2025-03-07T23:20:53.472547853Z","pruned":[]}
251212025-03-07T23:30:53.515ZINFOtest_unauthorized (external client test context): client received response status = 401
251222025-03-07T23:30:53.516ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251232025-03-07T23:30:53.516ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251242025-03-07T23:30:53.521ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
251252025-03-07T23:30:53.527ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
251262025-03-07T23:30:53.527ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
251272025-03-07T23:30:53.527ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
251282025-03-07T23:30:53.527ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
251292025-03-07T23:30:53.528ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
251302025-03-07T23:30:53.537ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
251312025-03-07T23:30:53.537ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
251322025-03-07T23:30:53.537ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
251332025-03-07T23:30:53.538ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
251342025-03-07T23:30:53.546ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 70.716056ms iteration = 3 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
251352025-03-07T23:30:53.547ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b011d1d7-c14a-4a30-afcd-d380fb37f355 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251362025-03-07T23:30:53.547ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: b5 4e 01 00 00 01 00 00 00 00 00 01 24 63 30 31 .N..........$c01\n0010: 63 30 31 34 62 2d 34 32 38 37 2d 34 61 66 34 2d c014b-4287-4af4-\n0020: 62 36 36 62 2d 34 31 30 39 35 62 66 37 38 34 31 b66b-41095bf7841\n0030: 66 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 f.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:52489 req_id = 9aa15f6e-0fe6-4237-8396-d6e30c1345f7
251372025-03-07T23:30:53.547ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 46414,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 99,\n 48,\n 49,\n 99,\n 48,\n 49,\n 52,\n 98,\n 45,\n 52,\n 50,\n 56,\n 55,\n 45,\n 52,\n 97,\n 102,\n 52,\n 45,\n 98,\n 54,\n 54,\n 98,\n 45,\n 52,\n 49,\n 48,\n 57,\n 53,\n 98,\n 102,\n 55,\n 56,\n 52,\n 49,\n 102,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52489 req_id = 9aa15f6e-0fe6-4237-8396-d6e30c1345f7
251382025-03-07T23:30:53.547ZDEBGtest_unauthorized (store): query key key = c01c014b-4287-4af4-b66b-41095bf7841f.host
251392025-03-07T23:30:53.548ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:52489 query = LowerQuery { name: LowerName(Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal.")), original: Query { name: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("c01c014b-4287-4af4-b66b-41095bf7841f.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 9aa15f6e-0fe6-4237-8396-d6e30c1345f7
251402025-03-07T23:30:53.548ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 37 2d 01 00 00 01 00 00 00 00 00 01 24 32 30 32 7-..........$202\n0010: 30 65 31 38 35 2d 63 63 33 36 2d 34 38 38 31 2d 0e185-cc36-4881-\n0020: 39 61 65 37 2d 32 36 32 66 34 34 34 32 36 38 65 9ae7-262f444268e\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:60513 req_id = 16a1dd1d-9e9c-436b-872b-4b0837ce198a
251412025-03-07T23:30:53.548ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 14125,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 50,\n 48,\n 50,\n 48,\n 101,\n 49,\n 56,\n 53,\n 45,\n 99,\n 99,\n 51,\n 54,\n 45,\n 52,\n 56,\n 56,\n 49,\n 45,\n 57,\n 97,\n 101,\n 55,\n 45,\n 50,\n 54,\n 50,\n 102,\n 52,\n 52,\n 52,\n 50,\n 54,\n 56,\n 101,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60513 req_id = 16a1dd1d-9e9c-436b-872b-4b0837ce198a
251422025-03-07T23:30:53.548ZDEBGtest_unauthorized (store): query key key = 2020e185-cc36-4881-9ae7-262f444268e3.host
251432025-03-07T23:30:53.548ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:60513 query = LowerQuery { name: LowerName(Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal.")), original: Query { name: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("2020e185-cc36-4881-9ae7-262f444268e3.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 16a1dd1d-9e9c-436b-872b-4b0837ce198a
251442025-03-07T23:30:53.548ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b011d1d7-c14a-4a30-afcd-d380fb37f355 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251452025-03-07T23:30:53.548ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b011d1d7-c14a-4a30-afcd-d380fb37f355 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251462025-03-07T23:30:53.548ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1078 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b011d1d7-c14a-4a30-afcd-d380fb37f355 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251472025-03-07T23:30:53.549ZDEBGtest_unauthorized (BackgroundTasks): found DNS servers (no change) addresses = DnsServersList { addresses: [[::1]:48967] } background_task = dns_servers_internal current_servers = DnsServersList { addresses: [[::1]:48967] } dns_group = internal
251482025-03-07T23:30:53.549ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 308.784138ms iteration = 3 status = {"addresses":["[::1]:48967"]}
251492025-03-07T23:30:53.549ZDEBGtest_unauthorized (BackgroundTasks): found DNS servers (no change) addresses = DnsServersList { addresses: [[::1]:39729] } background_task = dns_servers_external current_servers = DnsServersList { addresses: [[::1]:39729] } dns_group = external
251502025-03-07T23:30:53.549ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 77.362614ms iteration = 3 status = {"addresses":["[::1]:39729"]}
251512025-03-07T23:30:53.549ZINFOtest_unauthorized (external client test context): client received response status = 401
251522025-03-07T23:30:53.549ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251532025-03-07T23:30:53.549ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251542025-03-07T23:30:53.550ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 98ce4eb4-6ada-4b2d-8b53-9799bc730364 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251552025-03-07T23:30:53.550ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 98ce4eb4-6ada-4b2d-8b53-9799bc730364 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251562025-03-07T23:30:53.551ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5405:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5420:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RouterPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 98ce4eb4-6ada-4b2d-8b53-9799bc730364 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251572025-03-07T23:30:53.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1072 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 98ce4eb4-6ada-4b2d-8b53-9799bc730364 response_code = 401 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251582025-03-07T23:30:53.552ZINFOtest_unauthorized (external client test context): client received response status = 401
251592025-03-07T23:30:53.552ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251602025-03-07T23:30:53.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251612025-03-07T23:30:53.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 42856fe6-4ed4-4650-bc31-000dd5c7971d uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251622025-03-07T23:30:53.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 42856fe6-4ed4-4650-bc31-000dd5c7971d response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251632025-03-07T23:30:53.552ZINFOtest_unauthorized (external client test context): client received response status = 405
251642025-03-07T23:30:53.552ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251652025-03-07T23:30:53.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251662025-03-07T23:30:53.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5fa93eaa-d828-4bae-9828-4e43e4b011cb uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251672025-03-07T23:30:53.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5fa93eaa-d828-4bae-9828-4e43e4b011cb response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251682025-03-07T23:30:53.552ZINFOtest_unauthorized (external client test context): client received response status = 405
251692025-03-07T23:30:53.552ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251702025-03-07T23:30:53.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251712025-03-07T23:30:53.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3790abb3-2d67-4d0a-836a-d6851d9fe7e7 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251722025-03-07T23:30:53.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3790abb3-2d67-4d0a-836a-d6851d9fe7e7 response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251732025-03-07T23:30:53.553ZINFOtest_unauthorized (external client test context): client received response status = 405
251742025-03-07T23:30:53.553ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251752025-03-07T23:30:53.553ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251762025-03-07T23:30:53.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 00462613-1bae-401e-a5fe-2279520d79df uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251772025-03-07T23:30:53.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 156 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 00462613-1bae-401e-a5fe-2279520d79df response_code = 405 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251782025-03-07T23:30:53.554ZINFOtest_unauthorized (external client test context): client received response status = 405
251792025-03-07T23:30:53.554ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251802025-03-07T23:30:53.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251812025-03-07T23:30:53.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251822025-03-07T23:30:53.555ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251832025-03-07T23:30:53.555ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
251842025-03-07T23:30:53.555ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
251852025-03-07T23:30:53.555ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
251862025-03-07T23:30:53.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
251872025-03-07T23:30:53.568ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
251882025-03-07T23:30:53.569ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
251892025-03-07T23:30:53.571ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
251902025-03-07T23:30:53.601ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
251912025-03-07T23:30:53.601ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
251922025-03-07T23:30:53.601ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
251932025-03-07T23:30:53.602ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 125.706335ms iteration = 2 status = {"errors":[],"found_port_ok":[]}
251942025-03-07T23:30:53.603ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
251952025-03-07T23:30:53.603ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
251962025-03-07T23:30:53.604ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
251972025-03-07T23:30:53.658ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 177.435687ms iteration = 2 status = {"errors":[],"requests_created_ok":[]}
251982025-03-07T23:30:53.664ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
251992025-03-07T23:30:53.664ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
252002025-03-07T23:30:53.665ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
252012025-03-07T23:30:53.676ZDEBGtest_unauthorized (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
252022025-03-07T23:30:53.676ZINFOtest_unauthorized (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
252032025-03-07T23:30:53.676ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 200.063835ms iteration = 2 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
252042025-03-07T23:30:53.695ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
252052025-03-07T23:30:53.695ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
252062025-03-07T23:30:53.696ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
252072025-03-07T23:30:53.715ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 237.189314ms iteration = 2 status = {"errors":[],"garbage_collect_requested":[]}
252082025-03-07T23:30:53.715ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 237.036781ms iteration = 2 status = {"errors":[],"finish_invoked_ok":[]}
252092025-03-07T23:30:53.733ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252102025-03-07T23:30:53.744ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
252112025-03-07T23:30:53.755ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252122025-03-07T23:30:53.766ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
252132025-03-07T23:30:53.768ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
252142025-03-07T23:30:53.768ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
252152025-03-07T23:30:53.768ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
252162025-03-07T23:30:53.768ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
252172025-03-07T23:30:53.769ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
252182025-03-07T23:30:53.769ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
252192025-03-07T23:30:53.770ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
252202025-03-07T23:30:53.771ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
252212025-03-07T23:30:53.789ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 292178 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = b08529bc-89b9-4819-9c43-0cae270316cf response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
252222025-03-07T23:30:53.789ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
252232025-03-07T23:30:53.789ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
252242025-03-07T23:30:53.790ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
252252025-03-07T23:30:53.790ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
252262025-03-07T23:30:53.790ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
252272025-03-07T23:30:53.790ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
252282025-03-07T23:30:53.791ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
252292025-03-07T23:30:53.791ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
252302025-03-07T23:30:53.791ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 3
252312025-03-07T23:30:53.792ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
252322025-03-07T23:30:53.792ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
252332025-03-07T23:30:53.792ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
252342025-03-07T23:30:53.792ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
252352025-03-07T23:30:53.792ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
252362025-03-07T23:30:53.792ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
252372025-03-07T23:30:53.793ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
252382025-03-07T23:30:53.793ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
252392025-03-07T23:30:53.793ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
252402025-03-07T23:30:53.796ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
252412025-03-07T23:30:53.797ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b08529bc-89b9-4819-9c43-0cae270316cf", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:53 GMT"} })
252422025-03-07T23:30:53.798ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
252432025-03-07T23:30:53.798ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 58550c22-dca3-42dc-a24c-15d6f3524556 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
252442025-03-07T23:30:53.803ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 58550c22-dca3-42dc-a24c-15d6f3524556 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
252452025-03-07T23:30:53.806ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 58550c22-dca3-42dc-a24c-15d6f3524556 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
252462025-03-07T23:30:53.807ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 58550c22-dca3-42dc-a24c-15d6f3524556 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
252472025-03-07T23:30:53.815ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252482025-03-07T23:30:53.821ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
252492025-03-07T23:30:53.822ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
252502025-03-07T23:30:53.822ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
252512025-03-07T23:30:53.822ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
252522025-03-07T23:30:53.822ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
252532025-03-07T23:30:53.823ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
252542025-03-07T23:30:53.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252552025-03-07T23:30:53.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252562025-03-07T23:30:53.824ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252572025-03-07T23:30:53.824ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252582025-03-07T23:30:53.832ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
252592025-03-07T23:30:53.832ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
252602025-03-07T23:30:53.832ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
252612025-03-07T23:30:53.832ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
252622025-03-07T23:30:53.893ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252632025-03-07T23:30:53.901ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
252642025-03-07T23:30:53.901ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
252652025-03-07T23:30:53.901ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
252662025-03-07T23:30:53.901ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
252672025-03-07T23:30:53.927ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252682025-03-07T23:30:53.934ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
252692025-03-07T23:30:53.935ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
252702025-03-07T23:30:53.935ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
252712025-03-07T23:30:53.936ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
252722025-03-07T23:30:53.995ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252732025-03-07T23:30:54.011ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
252742025-03-07T23:30:54.012ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
252752025-03-07T23:30:54.012ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
252762025-03-07T23:30:54.014ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
252772025-03-07T23:30:54.014ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement elapsed = 539.425952ms iteration = 2 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
252782025-03-07T23:30:54.014ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 537.240748ms iteration = 2 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
252792025-03-07T23:30:54.015ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 217057 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 58550c22-dca3-42dc-a24c-15d6f3524556 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
252802025-03-07T23:30:54.016ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 540.411249ms iteration = 2 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
252812025-03-07T23:30:54.017ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
252822025-03-07T23:30:54.026ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
252832025-03-07T23:30:54.026ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
252842025-03-07T23:30:54.027ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
252852025-03-07T23:30:54.028ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
252862025-03-07T23:30:54.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
252872025-03-07T23:30:54.029ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
252882025-03-07T23:30:54.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
252892025-03-07T23:30:54.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
252902025-03-07T23:30:54.031ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
252912025-03-07T23:30:54.031ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
252922025-03-07T23:30:54.031ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
252932025-03-07T23:30:54.032ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
252942025-03-07T23:30:54.034ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
252952025-03-07T23:30:54.034ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
252962025-03-07T23:30:54.035ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
252972025-03-07T23:30:54.037ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
252982025-03-07T23:30:54.037ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 6a3363bb-3891-49d1-a620-cb1be142b908 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
252992025-03-07T23:30:54.037ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
253002025-03-07T23:30:54.038ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253012025-03-07T23:30:54.038ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
253022025-03-07T23:30:54.038ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
253032025-03-07T23:30:54.039ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
253042025-03-07T23:30:54.039ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "58550c22-dca3-42dc-a24c-15d6f3524556", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:53 GMT"} })
253052025-03-07T23:30:54.040ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
253062025-03-07T23:30:54.040ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
253072025-03-07T23:30:54.040ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
253082025-03-07T23:30:54.040ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
253092025-03-07T23:30:54.041ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253102025-03-07T23:30:54.041ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
253112025-03-07T23:30:54.041ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
253122025-03-07T23:30:54.043ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
253132025-03-07T23:30:54.044ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
253142025-03-07T23:30:54.044ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 1c466382-26d9-4eba-a972-8bc97483988b dns_zone_name = oxide-dev.test found_so_far = 0 version = 3
253152025-03-07T23:30:54.044ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
253162025-03-07T23:30:54.044ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253172025-03-07T23:30:54.044ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
253182025-03-07T23:30:54.044ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
253192025-03-07T23:30:54.045ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
253202025-03-07T23:30:54.161ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
253212025-03-07T23:30:54.161ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:57532/vpc-routes
253222025-03-07T23:30:54.164ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253232025-03-07T23:30:54.164ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253242025-03-07T23:30:54.164ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253252025-03-07T23:30:54.166ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253262025-03-07T23:30:54.311ZTRACtest_unauthorized (BackgroundTasks): checking on VMM background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
253272025-03-07T23:30:54.311ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher body = None method = GET uri = http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
253282025-03-07T23:30:54.314ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 835.226552ms iteration = 2 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
253292025-03-07T23:30:54.314ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:59745 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
253302025-03-07T23:30:54.314ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:56501 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
253312025-03-07T23:30:54.315ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
253322025-03-07T23:30:54.315ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
253332025-03-07T23:30:54.315ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
253342025-03-07T23:30:54.330ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
253352025-03-07T23:30:54.330ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
253362025-03-07T23:30:54.332ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
253372025-03-07T23:30:54.345ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
253382025-03-07T23:30:54.356ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
253392025-03-07T23:30:54.357ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
253402025-03-07T23:30:54.357ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
253412025-03-07T23:30:54.358ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
253422025-03-07T23:30:54.359ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
253432025-03-07T23:30:54.359ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253442025-03-07T23:30:54.359ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
253452025-03-07T23:30:54.359ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
253462025-03-07T23:30:54.360ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
253472025-03-07T23:30:54.361ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:59745 req_id = 42355e18-b34b-45fd-bbdc-05d77367f0ef sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
253482025-03-07T23:30:54.361ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:56501 req_id = 265c519b-f4c0-46ae-aba7-e5aa3de33ece sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
253492025-03-07T23:30:54.361ZINFOtest_unauthorized (dropshot): request completed latency_us = 1098 local_addr = [::1]:57532 method = GET remote_addr = [::1]:59745 req_id = 42355e18-b34b-45fd-bbdc-05d77367f0ef response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
253502025-03-07T23:30:54.361ZINFOtest_unauthorized (dropshot): request completed latency_us = 455 local_addr = [::1]:57532 method = GET remote_addr = [::1]:56501 req_id = 265c519b-f4c0-46ae-aba7-e5aa3de33ece response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state
253512025-03-07T23:30:54.364ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
253522025-03-07T23:30:54.369ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
253532025-03-07T23:30:54.369ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
253542025-03-07T23:30:54.369ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
253552025-03-07T23:30:54.370ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
253562025-03-07T23:30:54.371ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
253572025-03-07T23:30:54.387ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
253582025-03-07T23:30:54.387ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
253592025-03-07T23:30:54.387ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
253602025-03-07T23:30:54.387ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
253612025-03-07T23:30:54.388ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
253622025-03-07T23:30:54.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
253632025-03-07T23:30:54.393ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253642025-03-07T23:30:54.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253652025-03-07T23:30:54.394ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
253662025-03-07T23:30:54.394ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 6a3363bb-3891-49d1-a620-cb1be142b908 dns_zone_name = control-plane.oxide.internal found_so_far = 18 version = 1
253672025-03-07T23:30:54.394ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
253682025-03-07T23:30:54.394ZDEBGtest_unauthorized (BackgroundTasks): found latest DNS generation (unchanged) background_task = dns_config_internal current_generation = 1 current_time_created = 2025-03-07 23:29:55.958462 UTC dns_group = internal generation = 1
253692025-03-07T23:30:54.395ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 1.155575399s iteration = 3 status = {"generation":1}
253702025-03-07T23:30:54.395ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
253712025-03-07T23:30:54.402ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
253722025-03-07T23:30:54.402ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
253732025-03-07T23:30:54.402ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
253742025-03-07T23:30:54.402ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
253752025-03-07T23:30:54.402ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
253762025-03-07T23:30:54.403ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
253772025-03-07T23:30:54.411ZDEBGtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (no change) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-07T23:29:51.209697Z, time_modified: 2025-03-07T23:29:51.209697Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(2)) }, tls_certs: [TlsCertificate { digest: "a5e1aaf29183de4fa0b2dfcb0e54dba2781b6de720b3d13278fadf58f9c0d2a3" }] }, "demo-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, db_silo: Silo { identity: SiloIdentity { id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, name: Name(Name("demo-silo")), description: "", time_created: 2025-03-07T23:30:08.504234Z, time_modified: 2025-03-07T23:30:08.504234Z, time_deleted: None }, discoverable: true, authentication_mode: Saml, user_provision_type: Jit, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 3eb64c19-f07d-4328-aa21-1cd58fef44c0, dns_name: "demo-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 639f343f-2784-45fa-9934-45010d5cb460, db_silo: Silo { identity: SiloIdentity { id: 639f343f-2784-45fa-9934-45010d5cb460, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-07T23:29:57.728178Z, time_modified: 2025-03-07T23:29:57.728178Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
253782025-03-07T23:30:54.411ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 937.465214ms iteration = 5 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":["a5e1aaf29183de4fa0b2dfcb0e54dba2781b6de720b3d13278fadf58f9c0d2a3"]},"demo-silo.sys.oxide-dev.test":{"silo_id":"3eb64c19-f07d-4328-aa21-1cd58fef44c0","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]}},"default_endpoint":{"silo_id":"639f343f-2784-45fa-9934-45010d5cb460","tls_certs":[]},"warnings":["silo 3eb64c19-f07d-4328-aa21-1cd58fef44c0 with DNS name \\"demo-silo.sys.oxide-dev.test\\" has no usable certificates","silo 639f343f-2784-45fa-9934-45010d5cb460 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
253792025-03-07T23:30:54.412ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
253802025-03-07T23:30:54.412ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
253812025-03-07T23:30:54.413ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "42355e18-b34b-45fd-bbdc-05d77367f0ef", "content-length": "210", "date": "Fri, 07 Mar 2025 23:30:54 GMT"} })
253822025-03-07T23:30:54.413ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
253832025-03-07T23:30:54.413ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
253842025-03-07T23:30:54.414ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
253852025-03-07T23:30:54.415ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = instance_watcher result = Ok(Response { url: "http://[::1]:57532/vmms/d729e66e-f784-45dc-a942-a102e8bb8331/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "265c519b-f4c0-46ae-aba7-e5aa3de33ece", "content-length": "131", "date": "Fri, 07 Mar 2025 23:30:54 GMT"} })
253862025-03-07T23:30:54.415ZDEBGtest_unauthorized (BackgroundTasks): updating instance state background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }, migration_in: None, migration_out: None } vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
253872025-03-07T23:30:54.415ZINFOtest_unauthorized (BackgroundTasks): received new VMM runtime state from sled agent background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = d729e66e-f784-45dc-a942-a102e8bb8331 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331 vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-07T23:30:21.016307067Z }
253882025-03-07T23:30:54.415ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc resource = Database sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
253892025-03-07T23:30:54.415ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc roles = RoleSet { roles: {} } sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
253902025-03-07T23:30:54.415ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher instance_id = 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc resource = Database result = Ok(()) sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_id = d729e66e-f784-45dc-a942-a102e8bb8331
253912025-03-07T23:30:54.416ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 1c466382-26d9-4eba-a972-8bc97483988b dns_zone_name = oxide-dev.test found_so_far = 2 version = 3
253922025-03-07T23:30:54.416ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 3
253932025-03-07T23:30:54.416ZDEBGtest_unauthorized (BackgroundTasks): found latest DNS generation (unchanged) background_task = dns_config_external current_generation = 3 current_time_created = 2025-03-07 23:30:08.615505 UTC dns_group = external generation = 3
253942025-03-07T23:30:54.416ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 1.045597942s iteration = 4 status = {"generation":3}
253952025-03-07T23:30:54.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
253962025-03-07T23:30:54.416ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
253972025-03-07T23:30:54.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
253982025-03-07T23:30:54.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
253992025-03-07T23:30:54.418ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254002025-03-07T23:30:54.420ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
254012025-03-07T23:30:54.426ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
254022025-03-07T23:30:54.426ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
254032025-03-07T23:30:54.426ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
254042025-03-07T23:30:54.427ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
254052025-03-07T23:30:54.431ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
254062025-03-07T23:30:54.431ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254072025-03-07T23:30:54.431ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254082025-03-07T23:30:54.432ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254092025-03-07T23:30:54.535ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:57532/v2p
254102025-03-07T23:30:54.535ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
254112025-03-07T23:30:54.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
254122025-03-07T23:30:54.543ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254132025-03-07T23:30:54.544ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254142025-03-07T23:30:54.544ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254152025-03-07T23:30:54.544ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254162025-03-07T23:30:54.545ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:57532 remote_addr = [::1]:46221 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
254172025-03-07T23:30:54.546ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
254182025-03-07T23:30:54.546ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
254192025-03-07T23:30:54.547ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
254202025-03-07T23:30:54.551ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 1 total_failed = 0 total_incomplete = 0 total_instances = 1 update_sagas_queued = 0
254212025-03-07T23:30:54.552ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 1.070174046s iteration = 3 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{"starting":1},"pruned_instances":0,"total_instances":1,"update_sagas_queued":0}
254222025-03-07T23:30:54.552ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254232025-03-07T23:30:54.552ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254242025-03-07T23:30:54.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254252025-03-07T23:30:54.554ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
254262025-03-07T23:30:54.554ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
254272025-03-07T23:30:54.554ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
254282025-03-07T23:30:54.555ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = GET remote_addr = [::1]:46221 req_id = f4f2804c-0f34-4961-aca3-70825344af82 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
254292025-03-07T23:30:54.555ZINFOtest_unauthorized (dropshot): request completed latency_us = 233 local_addr = [::1]:57532 method = GET remote_addr = [::1]:46221 req_id = f4f2804c-0f34-4961-aca3-70825344af82 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
254302025-03-07T23:30:54.555ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:57532/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "f4f2804c-0f34-4961-aca3-70825344af82", "content-length": "101", "date": "Fri, 07 Mar 2025 23:30:54 GMT"} })
254312025-03-07T23:30:54.555ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(137359) }} sled = sim-b6d65341
254322025-03-07T23:30:54.555ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
254332025-03-07T23:30:54.556ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
254342025-03-07T23:30:54.558ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 1.076278971s iteration = 4 status = {}
254352025-03-07T23:30:54.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
254362025-03-07T23:30:54.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
254372025-03-07T23:30:54.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
254382025-03-07T23:30:54.566ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
254392025-03-07T23:30:54.566ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
254402025-03-07T23:30:54.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
254412025-03-07T23:30:54.569ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254422025-03-07T23:30:54.569ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254432025-03-07T23:30:54.572ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254442025-03-07T23:30:54.575ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
254452025-03-07T23:30:54.575ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
254462025-03-07T23:30:54.576ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
254472025-03-07T23:30:54.576ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
254482025-03-07T23:30:54.576ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
254492025-03-07T23:30:54.577ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254502025-03-07T23:30:54.577ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254512025-03-07T23:30:54.578ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254522025-03-07T23:30:54.581ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
254532025-03-07T23:30:54.589ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
254542025-03-07T23:30:54.590ZERROtest_unauthorized (BackgroundTasks): ipv6 addresses for service zone nat not implemented background_task = service_zone_nat_tracker
254552025-03-07T23:30:54.590ZERROtest_unauthorized (BackgroundTasks): generated config for fewer than the minimum allowed number of dns zones background_task = service_zone_nat_tracker
254562025-03-07T23:30:54.590ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 1.115486706s iteration = 3 status = {"error":"generated config for fewer than the minimum allowed number of dns zones"}
254572025-03-07T23:30:54.590ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254582025-03-07T23:30:54.590ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254592025-03-07T23:30:54.590ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254602025-03-07T23:30:54.590ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254612025-03-07T23:30:54.591ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254622025-03-07T23:30:54.596ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254632025-03-07T23:30:54.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254642025-03-07T23:30:54.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254652025-03-07T23:30:54.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254662025-03-07T23:30:54.612ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254672025-03-07T23:30:54.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254682025-03-07T23:30:54.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254692025-03-07T23:30:54.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = Database result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254702025-03-07T23:30:54.621ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254712025-03-07T23:30:54.637ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254722025-03-07T23:30:54.637ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1082651 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c4176400-fd30-45b7-96c7-41c6ace7f522 response_code = 200 uri = /v1/vpc-routers/demo-vpc-router?project=demo-project&vpc=demo-vpc
254732025-03-07T23:30:54.638ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b: {10.0.0.1: {faa36720-8d06-4c5a-8e59-3859e80311a0}, 10.0.0.0: {faa36720-8d06-4c5a-8e59-3859e80311a0}}} background_task = vpc_route_manager sled = sim-b6d65341
254742025-03-07T23:30:54.639ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/eip-gateways
254752025-03-07T23:30:54.640ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:59745 req_id = 1aaf127e-c84c-40d7-bfdb-7c90f15e7ec2 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
254762025-03-07T23:30:54.641ZINFOtest_unauthorized (dropshot): request completed latency_us = 586 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:59745 req_id = 1aaf127e-c84c-40d7-bfdb-7c90f15e7ec2 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
254772025-03-07T23:30:54.641ZINFOtest_unauthorized (external client test context): client received response status = 200
254782025-03-07T23:30:54.644ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254792025-03-07T23:30:54.644ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254802025-03-07T23:30:54.644ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254812025-03-07T23:30:54.644ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/eip-gateways", status: 204, headers: {"x-request-id": "1aaf127e-c84c-40d7-bfdb-7c90f15e7ec2", "date": "Fri, 07 Mar 2025 23:30:54 GMT"} })
254822025-03-07T23:30:54.644ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
254832025-03-07T23:30:54.644ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
254842025-03-07T23:30:54.645ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
254852025-03-07T23:30:54.645ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254862025-03-07T23:30:54.645ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254872025-03-07T23:30:54.645ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
254882025-03-07T23:30:54.645ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254892025-03-07T23:30:54.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254902025-03-07T23:30:54.646ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254912025-03-07T23:30:54.648ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
254922025-03-07T23:30:54.648ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
254932025-03-07T23:30:54.648ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
254942025-03-07T23:30:54.649ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
254952025-03-07T23:30:54.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
254962025-03-07T23:30:54.651ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
254972025-03-07T23:30:54.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
254982025-03-07T23:30:54.655ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
254992025-03-07T23:30:54.655ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255002025-03-07T23:30:54.655ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255012025-03-07T23:30:54.656ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255022025-03-07T23:30:54.656ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
255032025-03-07T23:30:54.656ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
255042025-03-07T23:30:54.657ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
255052025-03-07T23:30:54.662ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
255062025-03-07T23:30:54.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255072025-03-07T23:30:54.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255082025-03-07T23:30:54.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255092025-03-07T23:30:54.663ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 push not needed background_task = vpc_route_manager
255102025-03-07T23:30:54.664ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:57532/vpc-routes
255112025-03-07T23:30:54.668ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:57532 method = PUT remote_addr = [::1]:59745 req_id = 5f2ce85c-17ee-4df3-97ee-e8eb663fea69 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
255122025-03-07T23:30:54.668ZINFOtest_unauthorized (dropshot): request completed latency_us = 428 local_addr = [::1]:57532 method = PUT remote_addr = [::1]:59745 req_id = 5f2ce85c-17ee-4df3-97ee-e8eb663fea69 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
255132025-03-07T23:30:54.668ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:57532/vpc-routes", status: 204, headers: {"x-request-id": "5f2ce85c-17ee-4df3-97ee-e8eb663fea69", "date": "Fri, 07 Mar 2025 23:30:54 GMT"} })
255142025-03-07T23:30:54.670ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 1.187721689s iteration = 7 status = {}
255152025-03-07T23:30:54.671ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
255162025-03-07T23:30:54.674ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
255172025-03-07T23:30:54.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255182025-03-07T23:30:54.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255192025-03-07T23:30:54.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255202025-03-07T23:30:54.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
255212025-03-07T23:30:54.680ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
255222025-03-07T23:30:54.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255232025-03-07T23:30:54.680ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255242025-03-07T23:30:54.680ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255252025-03-07T23:30:54.685ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
255262025-03-07T23:30:54.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255272025-03-07T23:30:54.685ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255282025-03-07T23:30:54.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255292025-03-07T23:30:54.690ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
255302025-03-07T23:30:54.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
255312025-03-07T23:30:54.694ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255322025-03-07T23:30:54.694ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255332025-03-07T23:30:54.694ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255342025-03-07T23:30:54.694ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255352025-03-07T23:30:54.698ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255362025-03-07T23:30:54.698ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255372025-03-07T23:30:54.699ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255382025-03-07T23:30:54.704ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255392025-03-07T23:30:54.704ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255402025-03-07T23:30:54.705ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255412025-03-07T23:30:54.711ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255422025-03-07T23:30:54.711ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255432025-03-07T23:30:54.713ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255442025-03-07T23:30:54.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255452025-03-07T23:30:54.718ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255462025-03-07T23:30:54.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255472025-03-07T23:30:54.719ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255482025-03-07T23:30:54.719ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255492025-03-07T23:30:54.725ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255502025-03-07T23:30:54.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255512025-03-07T23:30:54.727ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255522025-03-07T23:30:54.728ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255532025-03-07T23:30:54.733ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255542025-03-07T23:30:54.733ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255552025-03-07T23:30:54.734ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255562025-03-07T23:30:54.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255572025-03-07T23:30:54.740ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255582025-03-07T23:30:54.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255592025-03-07T23:30:54.752ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255602025-03-07T23:30:54.752ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255612025-03-07T23:30:54.752ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255622025-03-07T23:30:54.752ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255632025-03-07T23:30:54.752ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255642025-03-07T23:30:54.756ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255652025-03-07T23:30:54.756ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255662025-03-07T23:30:54.756ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255672025-03-07T23:30:54.757ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255682025-03-07T23:30:54.766ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255692025-03-07T23:30:54.766ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255702025-03-07T23:30:54.766ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255712025-03-07T23:30:54.767ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255722025-03-07T23:30:54.776ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255732025-03-07T23:30:54.787ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255742025-03-07T23:30:54.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255752025-03-07T23:30:54.787ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255762025-03-07T23:30:54.788ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255772025-03-07T23:30:54.804ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 159438 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4658d700-928c-48b8-b586-9fdffa0b2a50 response_code = 200 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255782025-03-07T23:30:54.805ZINFOtest_unauthorized (external client test context): client received response status = 200
255792025-03-07T23:30:54.805ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255802025-03-07T23:30:54.805ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255812025-03-07T23:30:54.806ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255822025-03-07T23:30:54.806ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255832025-03-07T23:30:54.806ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
255842025-03-07T23:30:54.806ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255852025-03-07T23:30:54.806ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255862025-03-07T23:30:54.807ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255872025-03-07T23:30:54.811ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255882025-03-07T23:30:54.817ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255892025-03-07T23:30:54.819ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255902025-03-07T23:30:54.822ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
255912025-03-07T23:30:54.822ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
255922025-03-07T23:30:54.822ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255932025-03-07T23:30:54.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255942025-03-07T23:30:54.824ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255952025-03-07T23:30:54.835ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
255962025-03-07T23:30:54.835ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
255972025-03-07T23:30:54.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
255982025-03-07T23:30:54.837ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
255992025-03-07T23:30:54.841ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
256002025-03-07T23:30:54.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
256012025-03-07T23:30:54.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256022025-03-07T23:30:54.848ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256032025-03-07T23:30:54.849ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256042025-03-07T23:30:54.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
256052025-03-07T23:30:54.859ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
256062025-03-07T23:30:54.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256072025-03-07T23:30:54.859ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256082025-03-07T23:30:54.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256092025-03-07T23:30:54.866ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
256102025-03-07T23:30:54.866ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256112025-03-07T23:30:54.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256122025-03-07T23:30:54.867ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256132025-03-07T23:30:54.871ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
256142025-03-07T23:30:54.876ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
256152025-03-07T23:30:54.876ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256162025-03-07T23:30:54.876ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256172025-03-07T23:30:54.876ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256182025-03-07T23:30:54.877ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256192025-03-07T23:30:54.880ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256202025-03-07T23:30:54.880ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256212025-03-07T23:30:54.880ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256222025-03-07T23:30:54.885ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256232025-03-07T23:30:54.885ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256242025-03-07T23:30:54.886ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256252025-03-07T23:30:54.891ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256262025-03-07T23:30:54.892ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256272025-03-07T23:30:54.892ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256282025-03-07T23:30:54.901ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256292025-03-07T23:30:54.902ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256302025-03-07T23:30:54.902ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256312025-03-07T23:30:54.902ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256322025-03-07T23:30:54.902ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256332025-03-07T23:30:54.909ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256342025-03-07T23:30:54.909ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256352025-03-07T23:30:54.909ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256362025-03-07T23:30:54.910ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256372025-03-07T23:30:54.920ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256382025-03-07T23:30:54.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256392025-03-07T23:30:54.920ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256402025-03-07T23:30:54.921ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256412025-03-07T23:30:54.936ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256422025-03-07T23:30:54.969ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256432025-03-07T23:30:54.969ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 163616 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0cea17a7-485e-4619-ae8b-736f2cbf7e42 response_code = 404 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256442025-03-07T23:30:54.970ZINFOtest_unauthorized (external client test context): client received response status = 404
256452025-03-07T23:30:54.970ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256462025-03-07T23:30:54.970ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256472025-03-07T23:30:54.970ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 68402f54-ccbd-42d2-a012-fddb482e3bfe uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256482025-03-07T23:30:54.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 68402f54-ccbd-42d2-a012-fddb482e3bfe uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256492025-03-07T23:30:54.971ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 68402f54-ccbd-42d2-a012-fddb482e3bfe uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256502025-03-07T23:30:54.971ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 68402f54-ccbd-42d2-a012-fddb482e3bfe uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256512025-03-07T23:30:54.971ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 324 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 68402f54-ccbd-42d2-a012-fddb482e3bfe response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256522025-03-07T23:30:54.971ZINFOtest_unauthorized (external client test context): client received response status = 401
256532025-03-07T23:30:54.971ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256542025-03-07T23:30:54.971ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256552025-03-07T23:30:54.971ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cfaedee3-3039-4e97-8382-8e321f6d1946 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256562025-03-07T23:30:54.971ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cfaedee3-3039-4e97-8382-8e321f6d1946 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256572025-03-07T23:30:54.971ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cfaedee3-3039-4e97-8382-8e321f6d1946 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256582025-03-07T23:30:54.971ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 178 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cfaedee3-3039-4e97-8382-8e321f6d1946 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256592025-03-07T23:30:54.971ZINFOtest_unauthorized (external client test context): client received response status = 401
256602025-03-07T23:30:54.971ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256612025-03-07T23:30:54.971ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256622025-03-07T23:30:54.972ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5dcc6b36-99cd-4633-9261-fcfef8789aec uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256632025-03-07T23:30:54.972ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5dcc6b36-99cd-4633-9261-fcfef8789aec uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256642025-03-07T23:30:54.973ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5463:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::RouterRoute>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5487:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::RouterRoute>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::RouterSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::RouterRoute>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5dcc6b36-99cd-4633-9261-fcfef8789aec uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256652025-03-07T23:30:54.973ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1082 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5dcc6b36-99cd-4633-9261-fcfef8789aec response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256662025-03-07T23:30:54.973ZINFOtest_unauthorized (external client test context): client received response status = 401
256672025-03-07T23:30:54.973ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256682025-03-07T23:30:54.973ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256692025-03-07T23:30:54.973ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b77218d7-3965-45b7-b611-a9199e958747 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256702025-03-07T23:30:54.973ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b77218d7-3965-45b7-b611-a9199e958747 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256712025-03-07T23:30:54.974ZINFOtest_unauthorized (external client test context): client received response status = 405
256722025-03-07T23:30:54.974ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256732025-03-07T23:30:54.974ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256742025-03-07T23:30:54.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0a23fdfd-bc0b-409f-9c8f-bcbbcc051cca uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256752025-03-07T23:30:54.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0a23fdfd-bc0b-409f-9c8f-bcbbcc051cca response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256762025-03-07T23:30:54.974ZINFOtest_unauthorized (external client test context): client received response status = 405
256772025-03-07T23:30:54.974ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256782025-03-07T23:30:54.974ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256792025-03-07T23:30:54.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1e3e928-9cfe-4478-95e6-4c4c8cc3972b uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256802025-03-07T23:30:54.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f1e3e928-9cfe-4478-95e6-4c4c8cc3972b response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256812025-03-07T23:30:54.975ZINFOtest_unauthorized (external client test context): client received response status = 405
256822025-03-07T23:30:54.975ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256832025-03-07T23:30:54.975ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256842025-03-07T23:30:54.975ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30f68e37-b842-4ee6-bdc0-9b57711a736f uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256852025-03-07T23:30:54.975ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30f68e37-b842-4ee6-bdc0-9b57711a736f response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256862025-03-07T23:30:54.975ZINFOtest_unauthorized (external client test context): client received response status = 405
256872025-03-07T23:30:54.975ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256882025-03-07T23:30:54.975ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256892025-03-07T23:30:54.976ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256902025-03-07T23:30:54.976ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256912025-03-07T23:30:54.976ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
256922025-03-07T23:30:54.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256932025-03-07T23:30:54.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256942025-03-07T23:30:54.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256952025-03-07T23:30:54.981ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
256962025-03-07T23:30:54.981ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
256972025-03-07T23:30:54.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
256982025-03-07T23:30:54.986ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
256992025-03-07T23:30:54.986ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
257002025-03-07T23:30:54.987ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257012025-03-07T23:30:54.987ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257022025-03-07T23:30:54.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257032025-03-07T23:30:55.007ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
257042025-03-07T23:30:55.007ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257052025-03-07T23:30:55.007ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257062025-03-07T23:30:55.007ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257072025-03-07T23:30:55.011ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
257082025-03-07T23:30:55.012ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
257092025-03-07T23:30:55.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257102025-03-07T23:30:55.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257112025-03-07T23:30:55.012ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257122025-03-07T23:30:55.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
257132025-03-07T23:30:55.020ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
257142025-03-07T23:30:55.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257152025-03-07T23:30:55.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257162025-03-07T23:30:55.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257172025-03-07T23:30:55.028ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
257182025-03-07T23:30:55.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
257192025-03-07T23:30:55.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
257202025-03-07T23:30:55.030ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
257212025-03-07T23:30:55.033ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
257222025-03-07T23:30:55.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
257232025-03-07T23:30:55.036ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257242025-03-07T23:30:55.036ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257252025-03-07T23:30:55.036ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257262025-03-07T23:30:55.037ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257272025-03-07T23:30:55.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257282025-03-07T23:30:55.039ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257292025-03-07T23:30:55.039ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257302025-03-07T23:30:55.041ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257312025-03-07T23:30:55.041ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257322025-03-07T23:30:55.042ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257332025-03-07T23:30:55.046ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257342025-03-07T23:30:55.046ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257352025-03-07T23:30:55.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257362025-03-07T23:30:55.047ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
257372025-03-07T23:30:55.048ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
257382025-03-07T23:30:55.048ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
257392025-03-07T23:30:55.049ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257402025-03-07T23:30:55.049ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257412025-03-07T23:30:55.049ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257422025-03-07T23:30:55.049ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257432025-03-07T23:30:55.051ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257442025-03-07T23:30:55.054ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257452025-03-07T23:30:55.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257462025-03-07T23:30:55.054ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257472025-03-07T23:30:55.055ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257482025-03-07T23:30:55.060ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257492025-03-07T23:30:55.060ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257502025-03-07T23:30:55.060ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257512025-03-07T23:30:55.061ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257522025-03-07T23:30:55.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257532025-03-07T23:30:55.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Err(ObjectNotFound { type_name: VpcRouter, lookup_type: ByName("demo-vpc-router") }) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257542025-03-07T23:30:55.105ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc-router with name "demo-vpc-router" error_message_internal = not found: vpc-router with name "demo-vpc-router" latency_us = 129164 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 63d82df6-161c-4d05-a394-3b77004983ed response_code = 404 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257552025-03-07T23:30:55.105ZINFOtest_unauthorized (external client test context): client received response status = 404
257562025-03-07T23:30:55.105ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257572025-03-07T23:30:55.106ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257582025-03-07T23:30:55.106ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70e75a54-dac1-493a-b929-d6dbc8125443 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257592025-03-07T23:30:55.107ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70e75a54-dac1-493a-b929-d6dbc8125443 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257602025-03-07T23:30:55.107ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70e75a54-dac1-493a-b929-d6dbc8125443 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257612025-03-07T23:30:55.107ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70e75a54-dac1-493a-b929-d6dbc8125443 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257622025-03-07T23:30:55.107ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 971 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70e75a54-dac1-493a-b929-d6dbc8125443 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257632025-03-07T23:30:55.107ZINFOtest_unauthorized (external client test context): client received response status = 401
257642025-03-07T23:30:55.107ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257652025-03-07T23:30:55.107ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257662025-03-07T23:30:55.109ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93005cfe-d6c8-4896-a3b5-53ac734da1d6 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257672025-03-07T23:30:55.109ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93005cfe-d6c8-4896-a3b5-53ac734da1d6 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257682025-03-07T23:30:55.109ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93005cfe-d6c8-4896-a3b5-53ac734da1d6 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257692025-03-07T23:30:55.110ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 893 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93005cfe-d6c8-4896-a3b5-53ac734da1d6 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257702025-03-07T23:30:55.114ZINFOtest_unauthorized (external client test context): client received response status = 401
257712025-03-07T23:30:55.114ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257722025-03-07T23:30:55.115ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257732025-03-07T23:30:55.115ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d274d450-2757-4cc1-ae73-fbb7a353db83 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257742025-03-07T23:30:55.115ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d274d450-2757-4cc1-ae73-fbb7a353db83 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257752025-03-07T23:30:55.117ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5531:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::RouterRoute>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5550:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::RouterRoute>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::RouterRoute>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d274d450-2757-4cc1-ae73-fbb7a353db83 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257762025-03-07T23:30:55.117ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2444 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d274d450-2757-4cc1-ae73-fbb7a353db83 response_code = 401 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257772025-03-07T23:30:55.118ZINFOtest_unauthorized (external client test context): client received response status = 401
257782025-03-07T23:30:55.118ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257792025-03-07T23:30:55.118ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257802025-03-07T23:30:55.119ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4fd4b562-a0c6-4aa7-865a-7eb7ad82a41d uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257812025-03-07T23:30:55.119ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 159 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4fd4b562-a0c6-4aa7-865a-7eb7ad82a41d response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257822025-03-07T23:30:55.119ZINFOtest_unauthorized (external client test context): client received response status = 405
257832025-03-07T23:30:55.119ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257842025-03-07T23:30:55.119ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257852025-03-07T23:30:55.120ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 33ee562c-de07-48a4-b9e2-5be10b64b9e6 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257862025-03-07T23:30:55.120ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 142 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 33ee562c-de07-48a4-b9e2-5be10b64b9e6 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257872025-03-07T23:30:55.120ZINFOtest_unauthorized (external client test context): client received response status = 405
257882025-03-07T23:30:55.120ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257892025-03-07T23:30:55.120ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257902025-03-07T23:30:55.121ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7ea02052-021d-466a-bd17-b6a105090fdb uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257912025-03-07T23:30:55.121ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 124 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7ea02052-021d-466a-bd17-b6a105090fdb response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257922025-03-07T23:30:55.121ZINFOtest_unauthorized (external client test context): client received response status = 405
257932025-03-07T23:30:55.121ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257942025-03-07T23:30:55.121ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257952025-03-07T23:30:55.122ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8a203f8f-8ab9-491f-9535-510198d4f4e6 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257962025-03-07T23:30:55.122ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 150 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8a203f8f-8ab9-491f-9535-510198d4f4e6 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257972025-03-07T23:30:55.122ZINFOtest_unauthorized (external client test context): client received response status = 405
257982025-03-07T23:30:55.122ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
257992025-03-07T23:30:55.123ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258002025-03-07T23:30:55.123ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d548f2e6-34fc-48a2-b34b-a32b16b352dc uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258012025-03-07T23:30:55.123ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 142 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d548f2e6-34fc-48a2-b34b-a32b16b352dc response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258022025-03-07T23:30:55.123ZINFOtest_unauthorized (external client test context): client received response status = 405
258032025-03-07T23:30:55.123ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258042025-03-07T23:30:55.124ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258052025-03-07T23:30:55.124ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 42afe21b-9872-43c0-8082-7d90323872a8 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258062025-03-07T23:30:55.124ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 141 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 42afe21b-9872-43c0-8082-7d90323872a8 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258072025-03-07T23:30:55.124ZINFOtest_unauthorized (external client test context): client received response status = 405
258082025-03-07T23:30:55.125ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258092025-03-07T23:30:55.125ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258102025-03-07T23:30:55.125ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2d9ef70a-85c3-49c2-8fe2-a8a5e9b0be8c uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258112025-03-07T23:30:55.125ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 143 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2d9ef70a-85c3-49c2-8fe2-a8a5e9b0be8c response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258122025-03-07T23:30:55.125ZINFOtest_unauthorized (external client test context): client received response status = 405
258132025-03-07T23:30:55.126ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258142025-03-07T23:30:55.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258152025-03-07T23:30:55.126ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7e8c69b5-8a77-4160-9170-e94f82ff8805 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258162025-03-07T23:30:55.126ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 218 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7e8c69b5-8a77-4160-9170-e94f82ff8805 response_code = 405 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258172025-03-07T23:30:55.126ZINFOtest_unauthorized (external client test context): client received response status = 405
258182025-03-07T23:30:55.127ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258192025-03-07T23:30:55.127ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258202025-03-07T23:30:55.127ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258212025-03-07T23:30:55.127ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258222025-03-07T23:30:55.128ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258232025-03-07T23:30:55.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258242025-03-07T23:30:55.128ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258252025-03-07T23:30:55.129ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258262025-03-07T23:30:55.133ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258272025-03-07T23:30:55.133ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258282025-03-07T23:30:55.135ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258292025-03-07T23:30:55.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
258302025-03-07T23:30:55.141ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
258312025-03-07T23:30:55.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258322025-03-07T23:30:55.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258332025-03-07T23:30:55.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258342025-03-07T23:30:55.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
258352025-03-07T23:30:55.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
258362025-03-07T23:30:55.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
258372025-03-07T23:30:55.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
258382025-03-07T23:30:55.158ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
258392025-03-07T23:30:55.158ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258402025-03-07T23:30:55.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258412025-03-07T23:30:55.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258422025-03-07T23:30:55.163ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
258432025-03-07T23:30:55.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
258442025-03-07T23:30:55.168ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258452025-03-07T23:30:55.168ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258462025-03-07T23:30:55.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258472025-03-07T23:30:55.169ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
258482025-03-07T23:30:55.169ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
258492025-03-07T23:30:55.177ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
258502025-03-07T23:30:55.177ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
258512025-03-07T23:30:55.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
258522025-03-07T23:30:55.178ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
258532025-03-07T23:30:55.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258542025-03-07T23:30:55.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258552025-03-07T23:30:55.184ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258562025-03-07T23:30:55.188ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
258572025-03-07T23:30:55.188ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
258582025-03-07T23:30:55.188ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
258592025-03-07T23:30:55.189ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
258602025-03-07T23:30:55.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
258612025-03-07T23:30:55.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
258622025-03-07T23:30:55.198ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258632025-03-07T23:30:55.198ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258642025-03-07T23:30:55.198ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258652025-03-07T23:30:55.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258662025-03-07T23:30:55.202ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258672025-03-07T23:30:55.202ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258682025-03-07T23:30:55.202ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258692025-03-07T23:30:55.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258702025-03-07T23:30:55.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258712025-03-07T23:30:55.205ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258722025-03-07T23:30:55.210ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258732025-03-07T23:30:55.210ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258742025-03-07T23:30:55.211ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258752025-03-07T23:30:55.220ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258762025-03-07T23:30:55.221ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258772025-03-07T23:30:55.221ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258782025-03-07T23:30:55.221ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258792025-03-07T23:30:55.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258802025-03-07T23:30:55.225ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258812025-03-07T23:30:55.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258822025-03-07T23:30:55.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258832025-03-07T23:30:55.226ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258842025-03-07T23:30:55.236ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258852025-03-07T23:30:55.236ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258862025-03-07T23:30:55.236ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258872025-03-07T23:30:55.237ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258882025-03-07T23:30:55.249ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258892025-03-07T23:30:55.262ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258902025-03-07T23:30:55.262ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258912025-03-07T23:30:55.262ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258922025-03-07T23:30:55.262ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258932025-03-07T23:30:55.262ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258942025-03-07T23:30:55.262ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258952025-03-07T23:30:55.263ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
258962025-03-07T23:30:55.265ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258972025-03-07T23:30:55.265ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258982025-03-07T23:30:55.265ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
258992025-03-07T23:30:55.266ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259002025-03-07T23:30:55.273ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259012025-03-07T23:30:55.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259022025-03-07T23:30:55.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259032025-03-07T23:30:55.275ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259042025-03-07T23:30:55.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259052025-03-07T23:30:55.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") } result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259062025-03-07T23:30:55.288ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259072025-03-07T23:30:55.288ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259082025-03-07T23:30:55.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be resource = Database result = Ok(()) uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259092025-03-07T23:30:55.300ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 172465 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ff3e481a-a2fb-4234-b239-d85f6eb165be response_code = 200 uri = /v1/vpc-router-routes?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259102025-03-07T23:30:55.300ZINFOtest_unauthorized (external client test context): client received response status = 200
259112025-03-07T23:30:55.302ZINFOtest_unauthorized: test: begin endpoint url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259122025-03-07T23:30:55.302ZINFOtest_unauthorized: test: privileged GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259132025-03-07T23:30:55.302ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259142025-03-07T23:30:55.303ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259152025-03-07T23:30:55.303ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259162025-03-07T23:30:55.304ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259172025-03-07T23:30:55.304ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259182025-03-07T23:30:55.304ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259192025-03-07T23:30:55.308ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259202025-03-07T23:30:55.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259212025-03-07T23:30:55.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259222025-03-07T23:30:55.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259232025-03-07T23:30:55.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
259242025-03-07T23:30:55.318ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
259252025-03-07T23:30:55.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259262025-03-07T23:30:55.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259272025-03-07T23:30:55.321ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259282025-03-07T23:30:55.324ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
259292025-03-07T23:30:55.324ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259302025-03-07T23:30:55.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259312025-03-07T23:30:55.326ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259322025-03-07T23:30:55.329ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
259332025-03-07T23:30:55.337ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
259342025-03-07T23:30:55.337ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259352025-03-07T23:30:55.337ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259362025-03-07T23:30:55.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259372025-03-07T23:30:55.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
259382025-03-07T23:30:55.347ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
259392025-03-07T23:30:55.347ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259402025-03-07T23:30:55.347ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259412025-03-07T23:30:55.349ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259422025-03-07T23:30:55.352ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
259432025-03-07T23:30:55.352ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
259442025-03-07T23:30:55.352ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
259452025-03-07T23:30:55.353ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
259462025-03-07T23:30:55.357ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
259472025-03-07T23:30:55.367ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
259482025-03-07T23:30:55.378ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259492025-03-07T23:30:55.378ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259502025-03-07T23:30:55.379ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259512025-03-07T23:30:55.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259522025-03-07T23:30:55.384ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259532025-03-07T23:30:55.384ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259542025-03-07T23:30:55.384ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259552025-03-07T23:30:55.392ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259562025-03-07T23:30:55.392ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259572025-03-07T23:30:55.394ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259582025-03-07T23:30:55.403ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259592025-03-07T23:30:55.403ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259602025-03-07T23:30:55.404ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259612025-03-07T23:30:55.413ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
259622025-03-07T23:30:55.414ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
259632025-03-07T23:30:55.414ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6e8940a7-bd2b-4be3-bc6d-1fb239e5287f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
259642025-03-07T23:30:55.415ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6e8940a7-bd2b-4be3-bc6d-1fb239e5287f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
259652025-03-07T23:30:55.415ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6e8940a7-bd2b-4be3-bc6d-1fb239e5287f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
259662025-03-07T23:30:55.416ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6e8940a7-bd2b-4be3-bc6d-1fb239e5287f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
259672025-03-07T23:30:55.423ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259682025-03-07T23:30:55.423ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259692025-03-07T23:30:55.424ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259702025-03-07T23:30:55.443ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 29266 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 6e8940a7-bd2b-4be3-bc6d-1fb239e5287f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
259712025-03-07T23:30:55.444ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
259722025-03-07T23:30:55.444ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e8940a7-bd2b-4be3-bc6d-1fb239e5287f", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:55 GMT"} })
259732025-03-07T23:30:55.445ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
259742025-03-07T23:30:55.445ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
259752025-03-07T23:30:55.446ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e73d1a0-8e40-47fc-a34b-0513a5b1012e uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
259762025-03-07T23:30:55.446ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 09f8f5f8-442b-49e4-b21d-dd0aaa06f4ea uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
259772025-03-07T23:30:55.447ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e73d1a0-8e40-47fc-a34b-0513a5b1012e resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
259782025-03-07T23:30:55.448ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e73d1a0-8e40-47fc-a34b-0513a5b1012e roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
259792025-03-07T23:30:55.449ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e73d1a0-8e40-47fc-a34b-0513a5b1012e resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
259802025-03-07T23:30:55.785ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 338522 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = 09f8f5f8-442b-49e4-b21d-dd0aaa06f4ea response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
259812025-03-07T23:30:55.785ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259822025-03-07T23:30:55.785ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259832025-03-07T23:30:55.785ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259842025-03-07T23:30:55.785ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259852025-03-07T23:30:55.786ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
259862025-03-07T23:30:55.787ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
259872025-03-07T23:30:55.787ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
259882025-03-07T23:30:55.787ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
259892025-03-07T23:30:55.787ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
259902025-03-07T23:30:55.787ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
259912025-03-07T23:30:55.787ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
259922025-03-07T23:30:55.787ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
259932025-03-07T23:30:55.791ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
259942025-03-07T23:30:55.792ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
259952025-03-07T23:30:55.792ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
259962025-03-07T23:30:55.792ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
259972025-03-07T23:30:55.793ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 347171 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7e73d1a0-8e40-47fc-a34b-0513a5b1012e response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
259982025-03-07T23:30:55.795ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "7e73d1a0-8e40-47fc-a34b-0513a5b1012e", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:55 GMT"} })
259992025-03-07T23:30:55.795ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
260002025-03-07T23:30:55.795ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260012025-03-07T23:30:55.795ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
260022025-03-07T23:30:55.798ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260032025-03-07T23:30:55.799ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260042025-03-07T23:30:55.799ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260052025-03-07T23:30:55.799ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260062025-03-07T23:30:55.807ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260072025-03-07T23:30:55.807ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260082025-03-07T23:30:55.807ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260092025-03-07T23:30:55.808ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260102025-03-07T23:30:55.817ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260112025-03-07T23:30:55.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260122025-03-07T23:30:55.832ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 529279 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0961a09-caff-44c8-a4e0-9b96d914c5b2 response_code = 200 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260132025-03-07T23:30:55.836ZINFOtest_unauthorized (external client test context): client received response status = 200
260142025-03-07T23:30:55.836ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260152025-03-07T23:30:55.836ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260162025-03-07T23:30:55.840ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260172025-03-07T23:30:55.840ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260182025-03-07T23:30:55.840ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260192025-03-07T23:30:55.840ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260202025-03-07T23:30:55.840ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260212025-03-07T23:30:55.842ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260222025-03-07T23:30:55.846ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260232025-03-07T23:30:55.846ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260242025-03-07T23:30:55.847ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260252025-03-07T23:30:56.315ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
260262025-03-07T23:30:56.318ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
260272025-03-07T23:30:56.318ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
260282025-03-07T23:30:56.322ZDEBGtest_unauthorized (results-sink): inserting 201 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
260292025-03-07T23:30:56.322ZDEBGtest_unauthorized (results-sink-cluster): inserting 201 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
260302025-03-07T23:30:56.323ZDEBGtest_unauthorized (clickhouse-client): unrolling 201 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
260312025-03-07T23:30:56.623ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
260322025-03-07T23:30:56.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
260332025-03-07T23:30:56.623ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
260342025-03-07T23:30:56.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260352025-03-07T23:30:56.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260362025-03-07T23:30:56.624ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260372025-03-07T23:30:56.625ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260382025-03-07T23:30:56.625ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
260392025-03-07T23:30:56.626ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
260402025-03-07T23:30:56.626ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260412025-03-07T23:30:56.628ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = fields_ipaddr
260422025-03-07T23:30:56.628ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 402 sql = INSERT INTO oximeter.fields_string FORMAT Native
260432025-03-07T23:30:56.635ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260442025-03-07T23:30:56.637ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260452025-03-07T23:30:56.637ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260462025-03-07T23:30:56.637ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
260472025-03-07T23:30:56.637ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
260482025-03-07T23:30:56.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260492025-03-07T23:30:56.637ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260502025-03-07T23:30:56.638ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260512025-03-07T23:30:56.639ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 402 table_name = fields_string
260522025-03-07T23:30:56.639ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 200 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
260532025-03-07T23:30:56.656ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
260542025-03-07T23:30:56.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
260552025-03-07T23:30:56.663ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260562025-03-07T23:30:56.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260572025-03-07T23:30:56.664ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260582025-03-07T23:30:56.665ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 200 table_name = fields_u16
260592025-03-07T23:30:56.666ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 206 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
260602025-03-07T23:30:56.670ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
260612025-03-07T23:30:56.671ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
260622025-03-07T23:30:56.671ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260632025-03-07T23:30:56.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260642025-03-07T23:30:56.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260652025-03-07T23:30:56.674ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 206 table_name = fields_uuid
260662025-03-07T23:30:56.675ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
260672025-03-07T23:30:56.679ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_cumulativeu64
260682025-03-07T23:30:56.683ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 199 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
260692025-03-07T23:30:56.684ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
260702025-03-07T23:30:56.686ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
260712025-03-07T23:30:56.686ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
260722025-03-07T23:30:56.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
260732025-03-07T23:30:56.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
260742025-03-07T23:30:56.703ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
260752025-03-07T23:30:56.703ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260762025-03-07T23:30:56.703ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260772025-03-07T23:30:56.703ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260782025-03-07T23:30:56.703ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260792025-03-07T23:30:56.704ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 199 table_name = measurements_histogramu64
260802025-03-07T23:30:56.704ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
260812025-03-07T23:30:56.714ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
260822025-03-07T23:30:56.714ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
260832025-03-07T23:30:56.715ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
260842025-03-07T23:30:56.715ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
260852025-03-07T23:30:56.716ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
260862025-03-07T23:30:56.720ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
260872025-03-07T23:30:56.720ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
260882025-03-07T23:30:56.722ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
260892025-03-07T23:30:56.722ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
260902025-03-07T23:30:56.724ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260912025-03-07T23:30:56.724ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260922025-03-07T23:30:56.725ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260932025-03-07T23:30:56.752ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260942025-03-07T23:30:56.752ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260952025-03-07T23:30:56.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260962025-03-07T23:30:56.756ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260972025-03-07T23:30:56.756ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260982025-03-07T23:30:56.757ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
260992025-03-07T23:30:56.764ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261002025-03-07T23:30:56.764ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261012025-03-07T23:30:56.764ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261022025-03-07T23:30:56.777ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261032025-03-07T23:30:56.778ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261042025-03-07T23:30:56.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261052025-03-07T23:30:56.779ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261062025-03-07T23:30:56.780ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261072025-03-07T23:30:56.805ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261082025-03-07T23:30:56.805ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261092025-03-07T23:30:56.806ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261102025-03-07T23:30:56.807ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261112025-03-07T23:30:56.827ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261122025-03-07T23:30:56.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261132025-03-07T23:30:56.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261142025-03-07T23:30:56.828ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261152025-03-07T23:30:56.861ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261162025-03-07T23:30:56.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } result = Err(ObjectNotFound { type_name: RouterRoute, lookup_type: ByName("demo-router-route") }) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261172025-03-07T23:30:56.890ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: router-route with name "demo-router-route" error_message_internal = not found: router-route with name "demo-router-route" latency_us = 1050084 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 52ac3bb3-4b36-4fab-88b2-18e34037e0ef response_code = 404 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261182025-03-07T23:30:56.891ZINFOtest_unauthorized (external client test context): client received response status = 404
261192025-03-07T23:30:56.891ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261202025-03-07T23:30:56.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261212025-03-07T23:30:56.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 004711c7-1076-4ede-a0c6-e1f391b81a37 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261222025-03-07T23:30:56.892ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 004711c7-1076-4ede-a0c6-e1f391b81a37 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261232025-03-07T23:30:56.892ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 004711c7-1076-4ede-a0c6-e1f391b81a37 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261242025-03-07T23:30:56.892ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 004711c7-1076-4ede-a0c6-e1f391b81a37 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261252025-03-07T23:30:56.892ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 608 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 004711c7-1076-4ede-a0c6-e1f391b81a37 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261262025-03-07T23:30:56.892ZINFOtest_unauthorized (external client test context): client received response status = 401
261272025-03-07T23:30:56.892ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261282025-03-07T23:30:56.892ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261292025-03-07T23:30:56.892ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8509250e-da2c-43a6-8cd5-445f8068bb9a uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261302025-03-07T23:30:56.892ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8509250e-da2c-43a6-8cd5-445f8068bb9a uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261312025-03-07T23:30:56.893ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8509250e-da2c-43a6-8cd5-445f8068bb9a uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261322025-03-07T23:30:56.893ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 224 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8509250e-da2c-43a6-8cd5-445f8068bb9a response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261332025-03-07T23:30:56.893ZINFOtest_unauthorized (external client test context): client received response status = 401
261342025-03-07T23:30:56.893ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261352025-03-07T23:30:56.893ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261362025-03-07T23:30:56.893ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c63ca86-149e-4992-ab1a-6fa129ca8cef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261372025-03-07T23:30:56.893ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c63ca86-149e-4992-ab1a-6fa129ca8cef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261382025-03-07T23:30:56.895ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5500:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5520:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::RouterSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c63ca86-149e-4992-ab1a-6fa129ca8cef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261392025-03-07T23:30:56.896ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2896 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c63ca86-149e-4992-ab1a-6fa129ca8cef response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261402025-03-07T23:30:56.896ZINFOtest_unauthorized (external client test context): client received response status = 401
261412025-03-07T23:30:56.897ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261422025-03-07T23:30:56.897ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261432025-03-07T23:30:56.897ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261442025-03-07T23:30:56.899ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261452025-03-07T23:30:56.899ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261462025-03-07T23:30:56.899ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261472025-03-07T23:30:56.899ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261482025-03-07T23:30:56.899ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261492025-03-07T23:30:56.926ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261502025-03-07T23:30:56.926ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261512025-03-07T23:30:56.927ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261522025-03-07T23:30:56.940ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
261532025-03-07T23:30:56.941ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
261542025-03-07T23:30:56.941ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261552025-03-07T23:30:56.941ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261562025-03-07T23:30:56.942ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261572025-03-07T23:30:56.944ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
261582025-03-07T23:30:56.944ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261592025-03-07T23:30:56.944ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261602025-03-07T23:30:56.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261612025-03-07T23:30:56.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
261622025-03-07T23:30:56.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
261632025-03-07T23:30:56.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261642025-03-07T23:30:56.954ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261652025-03-07T23:30:56.954ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261662025-03-07T23:30:56.959ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
261672025-03-07T23:30:56.960ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
261682025-03-07T23:30:56.960ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261692025-03-07T23:30:56.960ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261702025-03-07T23:30:56.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261712025-03-07T23:30:56.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
261722025-03-07T23:30:56.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
261732025-03-07T23:30:56.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
261742025-03-07T23:30:56.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
261752025-03-07T23:30:56.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
261762025-03-07T23:30:56.982ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
261772025-03-07T23:30:56.982ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261782025-03-07T23:30:56.982ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261792025-03-07T23:30:56.982ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261802025-03-07T23:30:56.983ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261812025-03-07T23:30:57.022ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261822025-03-07T23:30:57.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261832025-03-07T23:30:57.023ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261842025-03-07T23:30:57.031ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261852025-03-07T23:30:57.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261862025-03-07T23:30:57.031ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261872025-03-07T23:30:57.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261882025-03-07T23:30:57.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261892025-03-07T23:30:57.035ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261902025-03-07T23:30:57.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261912025-03-07T23:30:57.038ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261922025-03-07T23:30:57.039ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261932025-03-07T23:30:57.043ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261942025-03-07T23:30:57.044ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261952025-03-07T23:30:57.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261962025-03-07T23:30:57.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261972025-03-07T23:30:57.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
261982025-03-07T23:30:57.048ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
261992025-03-07T23:30:57.049ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
262002025-03-07T23:30:57.049ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
262012025-03-07T23:30:57.052ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262022025-03-07T23:30:57.052ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262032025-03-07T23:30:57.052ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262042025-03-07T23:30:57.052ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262052025-03-07T23:30:57.055ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262062025-03-07T23:30:57.055ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262072025-03-07T23:30:57.055ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262082025-03-07T23:30:57.056ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262092025-03-07T23:30:57.059ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262102025-03-07T23:30:57.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } result = Err(ObjectNotFound { type_name: RouterRoute, lookup_type: ByName("demo-router-route") }) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262112025-03-07T23:30:57.121ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: router-route with name "demo-router-route" error_message_internal = not found: router-route with name "demo-router-route" latency_us = 224144 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e4219998-8151-47b0-8a1b-72cad8bad25e response_code = 404 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262122025-03-07T23:30:57.122ZINFOtest_unauthorized (external client test context): client received response status = 404
262132025-03-07T23:30:57.122ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262142025-03-07T23:30:57.123ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262152025-03-07T23:30:57.123ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0055dade-4403-4800-b6ed-3364e75eee9c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262162025-03-07T23:30:57.123ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0055dade-4403-4800-b6ed-3364e75eee9c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262172025-03-07T23:30:57.124ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0055dade-4403-4800-b6ed-3364e75eee9c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262182025-03-07T23:30:57.124ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0055dade-4403-4800-b6ed-3364e75eee9c uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262192025-03-07T23:30:57.124ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1086 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0055dade-4403-4800-b6ed-3364e75eee9c response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262202025-03-07T23:30:57.124ZINFOtest_unauthorized (external client test context): client received response status = 401
262212025-03-07T23:30:57.124ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262222025-03-07T23:30:57.124ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262232025-03-07T23:30:57.125ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53a840c3-a4a7-4bf2-8314-a05fc229b0bd uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262242025-03-07T23:30:57.125ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53a840c3-a4a7-4bf2-8314-a05fc229b0bd uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262252025-03-07T23:30:57.125ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53a840c3-a4a7-4bf2-8314-a05fc229b0bd uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262262025-03-07T23:30:57.126ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 789 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 53a840c3-a4a7-4bf2-8314-a05fc229b0bd response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262272025-03-07T23:30:57.126ZINFOtest_unauthorized (external client test context): client received response status = 401
262282025-03-07T23:30:57.126ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262292025-03-07T23:30:57.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262302025-03-07T23:30:57.127ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c70b3055-5361-43e6-bd09-17ce08128957 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262312025-03-07T23:30:57.127ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c70b3055-5361-43e6-bd09-17ce08128957 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262322025-03-07T23:30:57.130ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5596:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5614:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::RouterRouteUpdate>), dropshot::handler::HttpResponseOk<omicron_common::api::external::RouterRoute>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c70b3055-5361-43e6-bd09-17ce08128957 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262332025-03-07T23:30:57.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 4043 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c70b3055-5361-43e6-bd09-17ce08128957 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262342025-03-07T23:30:57.134ZINFOtest_unauthorized (external client test context): client received response status = 401
262352025-03-07T23:30:57.135ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262362025-03-07T23:30:57.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262372025-03-07T23:30:57.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5be0f776-2f76-4839-b057-581a1a23b768 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262382025-03-07T23:30:57.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 210 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5be0f776-2f76-4839-b057-581a1a23b768 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262392025-03-07T23:30:57.136ZINFOtest_unauthorized (external client test context): client received response status = 405
262402025-03-07T23:30:57.136ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262412025-03-07T23:30:57.136ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262422025-03-07T23:30:57.136ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7c22d11d-e1ee-48aa-af8c-7326f66a9f1b uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262432025-03-07T23:30:57.137ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 145 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7c22d11d-e1ee-48aa-af8c-7326f66a9f1b response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262442025-03-07T23:30:57.137ZINFOtest_unauthorized (external client test context): client received response status = 405
262452025-03-07T23:30:57.137ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262462025-03-07T23:30:57.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262472025-03-07T23:30:57.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 23fc2702-5554-414c-8744-cfe8a96e1427 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262482025-03-07T23:30:57.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 143 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 23fc2702-5554-414c-8744-cfe8a96e1427 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262492025-03-07T23:30:57.138ZINFOtest_unauthorized (external client test context): client received response status = 405
262502025-03-07T23:30:57.138ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262512025-03-07T23:30:57.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262522025-03-07T23:30:57.139ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5979bd16-6a69-4306-bc65-939544ccd40a uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262532025-03-07T23:30:57.139ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 145 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5979bd16-6a69-4306-bc65-939544ccd40a response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262542025-03-07T23:30:57.139ZINFOtest_unauthorized (external client test context): client received response status = 405
262552025-03-07T23:30:57.139ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262562025-03-07T23:30:57.139ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262572025-03-07T23:30:57.140ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262582025-03-07T23:30:57.140ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262592025-03-07T23:30:57.140ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262602025-03-07T23:30:57.140ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262612025-03-07T23:30:57.140ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262622025-03-07T23:30:57.141ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262632025-03-07T23:30:57.144ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262642025-03-07T23:30:57.144ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262652025-03-07T23:30:57.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262662025-03-07T23:30:57.160ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
262672025-03-07T23:30:57.160ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
262682025-03-07T23:30:57.167ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
262692025-03-07T23:30:57.167ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
262702025-03-07T23:30:57.167ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262712025-03-07T23:30:57.168ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262722025-03-07T23:30:57.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262732025-03-07T23:30:57.172ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
262742025-03-07T23:30:57.172ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262752025-03-07T23:30:57.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262762025-03-07T23:30:57.172ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262772025-03-07T23:30:57.174ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
262782025-03-07T23:30:57.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
262792025-03-07T23:30:57.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262802025-03-07T23:30:57.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262812025-03-07T23:30:57.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262822025-03-07T23:30:57.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
262832025-03-07T23:30:57.198ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
262842025-03-07T23:30:57.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262852025-03-07T23:30:57.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262862025-03-07T23:30:57.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262872025-03-07T23:30:57.207ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
262882025-03-07T23:30:57.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
262892025-03-07T23:30:57.207ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
262902025-03-07T23:30:57.210ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
262912025-03-07T23:30:57.230ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
262922025-03-07T23:30:57.234ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
262932025-03-07T23:30:57.234ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262942025-03-07T23:30:57.234ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262952025-03-07T23:30:57.235ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262962025-03-07T23:30:57.235ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262972025-03-07T23:30:57.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262982025-03-07T23:30:57.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
262992025-03-07T23:30:57.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263002025-03-07T23:30:57.245ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263012025-03-07T23:30:57.245ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263022025-03-07T23:30:57.246ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263032025-03-07T23:30:57.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263042025-03-07T23:30:57.250ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263052025-03-07T23:30:57.251ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263062025-03-07T23:30:57.254ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263072025-03-07T23:30:57.254ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263082025-03-07T23:30:57.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263092025-03-07T23:30:57.259ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263102025-03-07T23:30:57.259ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263112025-03-07T23:30:57.259ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263122025-03-07T23:30:57.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263132025-03-07T23:30:57.279ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263142025-03-07T23:30:57.281ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
263152025-03-07T23:30:57.287ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263162025-03-07T23:30:57.287ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263172025-03-07T23:30:57.287ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263182025-03-07T23:30:57.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263192025-03-07T23:30:57.303ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263202025-03-07T23:30:57.303ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263212025-03-07T23:30:57.303ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263222025-03-07T23:30:57.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263232025-03-07T23:30:57.310ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263242025-03-07T23:30:57.386ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } result = Err(ObjectNotFound { type_name: RouterRoute, lookup_type: ByName("demo-router-route") }) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263252025-03-07T23:30:57.387ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: router-route with name "demo-router-route" error_message_internal = not found: router-route with name "demo-router-route" latency_us = 247174 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23c23b40-29a4-4264-879b-0c26e91a46ee response_code = 404 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263262025-03-07T23:30:57.387ZINFOtest_unauthorized (external client test context): client received response status = 404
263272025-03-07T23:30:57.388ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263282025-03-07T23:30:57.388ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263292025-03-07T23:30:57.389ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fcd76752-d5c3-4250-9cd4-fd04a621d191 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263302025-03-07T23:30:57.389ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fcd76752-d5c3-4250-9cd4-fd04a621d191 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263312025-03-07T23:30:57.389ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fcd76752-d5c3-4250-9cd4-fd04a621d191 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263322025-03-07T23:30:57.389ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fcd76752-d5c3-4250-9cd4-fd04a621d191 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263332025-03-07T23:30:57.389ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 488 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fcd76752-d5c3-4250-9cd4-fd04a621d191 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263342025-03-07T23:30:57.389ZINFOtest_unauthorized (external client test context): client received response status = 401
263352025-03-07T23:30:57.389ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263362025-03-07T23:30:57.389ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263372025-03-07T23:30:57.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f659642d-983d-447f-af5f-8154dccea8fb uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263382025-03-07T23:30:57.390ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f659642d-983d-447f-af5f-8154dccea8fb uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263392025-03-07T23:30:57.390ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f659642d-983d-447f-af5f-8154dccea8fb uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263402025-03-07T23:30:57.390ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 185 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f659642d-983d-447f-af5f-8154dccea8fb response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263412025-03-07T23:30:57.390ZINFOtest_unauthorized (external client test context): client received response status = 401
263422025-03-07T23:30:57.390ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263432025-03-07T23:30:57.390ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263442025-03-07T23:30:57.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5a429897-70d7-4ffe-9be4-ef1fcd81f328 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263452025-03-07T23:30:57.390ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5a429897-70d7-4ffe-9be4-ef1fcd81f328 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263462025-03-07T23:30:57.392ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5561:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5580:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::vpc_router_route_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::RoutePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalRouterSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5a429897-70d7-4ffe-9be4-ef1fcd81f328 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263472025-03-07T23:30:57.392ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1658 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5a429897-70d7-4ffe-9be4-ef1fcd81f328 response_code = 401 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263482025-03-07T23:30:57.392ZINFOtest_unauthorized (external client test context): client received response status = 401
263492025-03-07T23:30:57.392ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263502025-03-07T23:30:57.392ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263512025-03-07T23:30:57.393ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b0582e11-2024-4e53-bca3-d934d8100fd2 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263522025-03-07T23:30:57.393ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 158 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b0582e11-2024-4e53-bca3-d934d8100fd2 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263532025-03-07T23:30:57.393ZINFOtest_unauthorized (external client test context): client received response status = 405
263542025-03-07T23:30:57.393ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263552025-03-07T23:30:57.393ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263562025-03-07T23:30:57.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c2ccdaa7-81e9-42d7-87a1-73df4686612d uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263572025-03-07T23:30:57.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 169 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c2ccdaa7-81e9-42d7-87a1-73df4686612d response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263582025-03-07T23:30:57.394ZINFOtest_unauthorized (external client test context): client received response status = 405
263592025-03-07T23:30:57.395ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263602025-03-07T23:30:57.395ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263612025-03-07T23:30:57.395ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 743ac456-030f-4d68-a14e-7d91c9f95196 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263622025-03-07T23:30:57.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 563 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 743ac456-030f-4d68-a14e-7d91c9f95196 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263632025-03-07T23:30:57.396ZINFOtest_unauthorized (external client test context): client received response status = 405
263642025-03-07T23:30:57.396ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263652025-03-07T23:30:57.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263662025-03-07T23:30:57.397ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ac7303d7-d438-4440-9533-948f18024731 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263672025-03-07T23:30:57.397ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 246 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ac7303d7-d438-4440-9533-948f18024731 response_code = 405 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263682025-03-07T23:30:57.397ZINFOtest_unauthorized (external client test context): client received response status = 405
263692025-03-07T23:30:57.397ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263702025-03-07T23:30:57.397ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263712025-03-07T23:30:57.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263722025-03-07T23:30:57.398ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263732025-03-07T23:30:57.398ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
263742025-03-07T23:30:57.398ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263752025-03-07T23:30:57.398ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263762025-03-07T23:30:57.399ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263772025-03-07T23:30:57.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263782025-03-07T23:30:57.402ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263792025-03-07T23:30:57.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263802025-03-07T23:30:57.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
263812025-03-07T23:30:57.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
263822025-03-07T23:30:57.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
263832025-03-07T23:30:57.412ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
263842025-03-07T23:30:57.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263852025-03-07T23:30:57.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263862025-03-07T23:30:57.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263872025-03-07T23:30:57.415ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 8055814b-5440-40c4-813c-cc83b2ee0970 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
263882025-03-07T23:30:57.415ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 8055814b-5440-40c4-813c-cc83b2ee0970 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
263892025-03-07T23:30:57.415ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 8055814b-5440-40c4-813c-cc83b2ee0970 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
263902025-03-07T23:30:57.417ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 8055814b-5440-40c4-813c-cc83b2ee0970 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
263912025-03-07T23:30:57.419ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
263922025-03-07T23:30:57.419ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
263932025-03-07T23:30:57.419ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
263942025-03-07T23:30:57.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
263952025-03-07T23:30:57.421ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6479 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 8055814b-5440-40c4-813c-cc83b2ee0970 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
263962025-03-07T23:30:57.421ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "8055814b-5440-40c4-813c-cc83b2ee0970", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:56 GMT"} })
263972025-03-07T23:30:57.422ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
263982025-03-07T23:30:57.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
263992025-03-07T23:30:57.428ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
264002025-03-07T23:30:57.428ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264012025-03-07T23:30:57.428ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264022025-03-07T23:30:57.429ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264032025-03-07T23:30:57.430ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1b31811e-1cd3-493a-af24-3054231b77f3 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
264042025-03-07T23:30:57.431ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1b31811e-1cd3-493a-af24-3054231b77f3 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
264052025-03-07T23:30:57.431ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1b31811e-1cd3-493a-af24-3054231b77f3 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
264062025-03-07T23:30:57.432ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1b31811e-1cd3-493a-af24-3054231b77f3 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
264072025-03-07T23:30:57.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
264082025-03-07T23:30:57.434ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
264092025-03-07T23:30:57.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264102025-03-07T23:30:57.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264112025-03-07T23:30:57.435ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264122025-03-07T23:30:57.436ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6253 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1b31811e-1cd3-493a-af24-3054231b77f3 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
264132025-03-07T23:30:57.436ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "1b31811e-1cd3-493a-af24-3054231b77f3", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:56 GMT"} })
264142025-03-07T23:30:57.436ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
264152025-03-07T23:30:57.436ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
264162025-03-07T23:30:57.436ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
264172025-03-07T23:30:57.440ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
264182025-03-07T23:30:57.440ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264192025-03-07T23:30:57.440ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264202025-03-07T23:30:57.441ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264212025-03-07T23:30:57.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
264222025-03-07T23:30:57.446ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
264232025-03-07T23:30:57.447ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264242025-03-07T23:30:57.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264252025-03-07T23:30:57.447ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264262025-03-07T23:30:57.447ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264272025-03-07T23:30:57.450ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264282025-03-07T23:30:57.450ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264292025-03-07T23:30:57.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264302025-03-07T23:30:57.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264312025-03-07T23:30:57.456ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264322025-03-07T23:30:57.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264332025-03-07T23:30:57.461ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264342025-03-07T23:30:57.461ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264352025-03-07T23:30:57.462ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264362025-03-07T23:30:57.468ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264372025-03-07T23:30:57.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264382025-03-07T23:30:57.468ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264392025-03-07T23:30:57.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264402025-03-07T23:30:57.471ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264412025-03-07T23:30:57.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264422025-03-07T23:30:57.471ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264432025-03-07T23:30:57.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264442025-03-07T23:30:57.475ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264452025-03-07T23:30:57.475ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264462025-03-07T23:30:57.475ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264472025-03-07T23:30:57.476ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264482025-03-07T23:30:57.484ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264492025-03-07T23:30:57.484ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264502025-03-07T23:30:57.485ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264512025-03-07T23:30:57.485ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = Database result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264522025-03-07T23:30:57.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264532025-03-07T23:30:57.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef resource = RouterRoute { parent: VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") }, key: 046857ad-e60f-4ab5-82c2-0d0041394df0, lookup_type: ByName("demo-vpc-router") }, key: 7c36ee62-568f-4be4-8181-51826e899c4c, lookup_type: ByName("demo-router-route") } result = Ok(()) uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264542025-03-07T23:30:57.509ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 111778 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c1f229ea-f8f0-43d8-a313-e31cae1591ef response_code = 200 uri = /v1/vpc-router-routes/demo-router-route?project=demo-project&vpc=demo-vpc&router=demo-vpc-router
264552025-03-07T23:30:57.510ZINFOtest_unauthorized (external client test context): client received response status = 200
264562025-03-07T23:30:57.510ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264572025-03-07T23:30:57.510ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264582025-03-07T23:30:57.510ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264592025-03-07T23:30:57.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
264602025-03-07T23:30:57.511ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264612025-03-07T23:30:57.511ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264622025-03-07T23:30:57.511ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264632025-03-07T23:30:57.511ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264642025-03-07T23:30:57.511ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264652025-03-07T23:30:57.512ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264662025-03-07T23:30:57.520ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264672025-03-07T23:30:57.520ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264682025-03-07T23:30:57.520ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264692025-03-07T23:30:57.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
264702025-03-07T23:30:57.526ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
264712025-03-07T23:30:57.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264722025-03-07T23:30:57.527ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264732025-03-07T23:30:57.527ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264742025-03-07T23:30:57.532ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
264752025-03-07T23:30:57.532ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264762025-03-07T23:30:57.532ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264772025-03-07T23:30:57.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264782025-03-07T23:30:57.536ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
264792025-03-07T23:30:57.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
264802025-03-07T23:30:57.543ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264812025-03-07T23:30:57.543ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264822025-03-07T23:30:57.544ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264832025-03-07T23:30:57.550ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
264842025-03-07T23:30:57.550ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
264852025-03-07T23:30:57.550ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264862025-03-07T23:30:57.550ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264872025-03-07T23:30:57.551ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264882025-03-07T23:30:57.556ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
264892025-03-07T23:30:57.556ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
264902025-03-07T23:30:57.556ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
264912025-03-07T23:30:57.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
264922025-03-07T23:30:57.559ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
264932025-03-07T23:30:57.563ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
264942025-03-07T23:30:57.563ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264952025-03-07T23:30:57.563ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264962025-03-07T23:30:57.563ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264972025-03-07T23:30:57.564ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
264982025-03-07T23:30:57.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
264992025-03-07T23:30:57.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
265002025-03-07T23:30:57.568ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
265012025-03-07T23:30:57.569ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
265022025-03-07T23:30:57.569ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
265032025-03-07T23:30:57.569ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
265042025-03-07T23:30:57.569ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265052025-03-07T23:30:57.569ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265062025-03-07T23:30:57.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265072025-03-07T23:30:57.573ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265082025-03-07T23:30:57.573ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265092025-03-07T23:30:57.573ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265102025-03-07T23:30:57.575ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265112025-03-07T23:30:57.575ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265122025-03-07T23:30:57.575ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265132025-03-07T23:30:57.575ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265142025-03-07T23:30:57.575ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265152025-03-07T23:30:57.581ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265162025-03-07T23:30:57.581ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265172025-03-07T23:30:57.581ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265182025-03-07T23:30:57.581ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265192025-03-07T23:30:57.585ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265202025-03-07T23:30:57.585ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265212025-03-07T23:30:57.585ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265222025-03-07T23:30:57.586ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265232025-03-07T23:30:57.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265242025-03-07T23:30:57.621ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265252025-03-07T23:30:57.622ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 110996 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1fb7d083-7a48-4665-aebb-8b9a97dc524d response_code = 404 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265262025-03-07T23:30:57.622ZINFOtest_unauthorized (external client test context): client received response status = 404
265272025-03-07T23:30:57.622ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265282025-03-07T23:30:57.622ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265292025-03-07T23:30:57.622ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63a55ab9-c307-4638-afc5-1aa7aa1a18c5 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265302025-03-07T23:30:57.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63a55ab9-c307-4638-afc5-1aa7aa1a18c5 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265312025-03-07T23:30:57.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63a55ab9-c307-4638-afc5-1aa7aa1a18c5 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265322025-03-07T23:30:57.623ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63a55ab9-c307-4638-afc5-1aa7aa1a18c5 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265332025-03-07T23:30:57.623ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 314 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 63a55ab9-c307-4638-afc5-1aa7aa1a18c5 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265342025-03-07T23:30:57.623ZINFOtest_unauthorized (external client test context): client received response status = 401
265352025-03-07T23:30:57.623ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265362025-03-07T23:30:57.623ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265372025-03-07T23:30:57.623ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f34618bb-cf22-488c-9a53-626e75e47572 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265382025-03-07T23:30:57.623ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f34618bb-cf22-488c-9a53-626e75e47572 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265392025-03-07T23:30:57.623ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f34618bb-cf22-488c-9a53-626e75e47572 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265402025-03-07T23:30:57.623ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 168 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f34618bb-cf22-488c-9a53-626e75e47572 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265412025-03-07T23:30:57.624ZINFOtest_unauthorized (external client test context): client received response status = 401
265422025-03-07T23:30:57.624ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265432025-03-07T23:30:57.624ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265442025-03-07T23:30:57.624ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 202c72a4-cb7d-46e5-b0ef-ad56fa6867bf uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265452025-03-07T23:30:57.624ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 202c72a4-cb7d-46e5-b0ef-ad56fa6867bf uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265462025-03-07T23:30:57.626ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5628:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGateway>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5652:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGateway>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::VpcSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGateway>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 202c72a4-cb7d-46e5-b0ef-ad56fa6867bf uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265472025-03-07T23:30:57.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1520 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 202c72a4-cb7d-46e5-b0ef-ad56fa6867bf response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265482025-03-07T23:30:57.626ZINFOtest_unauthorized (external client test context): client received response status = 401
265492025-03-07T23:30:57.626ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265502025-03-07T23:30:57.626ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265512025-03-07T23:30:57.626ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d1674dd2-36c3-4c6c-bcb4-f983ec2623b1 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265522025-03-07T23:30:57.626ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d1674dd2-36c3-4c6c-bcb4-f983ec2623b1 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265532025-03-07T23:30:57.626ZINFOtest_unauthorized (external client test context): client received response status = 405
265542025-03-07T23:30:57.627ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265552025-03-07T23:30:57.627ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265562025-03-07T23:30:57.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 182f17dd-81b6-4b83-8ee0-1df3927833f0 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265572025-03-07T23:30:57.627ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 74 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 182f17dd-81b6-4b83-8ee0-1df3927833f0 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265582025-03-07T23:30:57.627ZINFOtest_unauthorized (external client test context): client received response status = 405
265592025-03-07T23:30:57.627ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265602025-03-07T23:30:57.627ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265612025-03-07T23:30:57.627ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 10f3c562-9113-41db-872b-c2667235a31d uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265622025-03-07T23:30:57.627ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 10f3c562-9113-41db-872b-c2667235a31d response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265632025-03-07T23:30:57.627ZINFOtest_unauthorized (external client test context): client received response status = 405
265642025-03-07T23:30:57.627ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265652025-03-07T23:30:57.627ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265662025-03-07T23:30:57.628ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 296c15cd-1694-4e13-9b00-21a2056c0a37 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265672025-03-07T23:30:57.628ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 296c15cd-1694-4e13-9b00-21a2056c0a37 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265682025-03-07T23:30:57.628ZINFOtest_unauthorized (external client test context): client received response status = 405
265692025-03-07T23:30:57.628ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265702025-03-07T23:30:57.628ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
265712025-03-07T23:30:57.628ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265722025-03-07T23:30:57.628ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265732025-03-07T23:30:57.628ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
265742025-03-07T23:30:57.629ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265752025-03-07T23:30:57.629ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265762025-03-07T23:30:57.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265772025-03-07T23:30:57.634ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265782025-03-07T23:30:57.634ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265792025-03-07T23:30:57.635ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265802025-03-07T23:30:57.644ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
265812025-03-07T23:30:57.644ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
265822025-03-07T23:30:57.644ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265832025-03-07T23:30:57.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265842025-03-07T23:30:57.645ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265852025-03-07T23:30:57.650ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
265862025-03-07T23:30:57.650ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265872025-03-07T23:30:57.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265882025-03-07T23:30:57.651ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265892025-03-07T23:30:57.653ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
265902025-03-07T23:30:57.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
265912025-03-07T23:30:57.658ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265922025-03-07T23:30:57.658ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265932025-03-07T23:30:57.659ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265942025-03-07T23:30:57.663ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
265952025-03-07T23:30:57.663ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
265962025-03-07T23:30:57.663ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
265972025-03-07T23:30:57.663ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
265982025-03-07T23:30:57.664ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
265992025-03-07T23:30:57.668ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
266002025-03-07T23:30:57.668ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
266012025-03-07T23:30:57.668ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
266022025-03-07T23:30:57.669ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
266032025-03-07T23:30:57.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
266042025-03-07T23:30:57.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
266052025-03-07T23:30:57.675ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266062025-03-07T23:30:57.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266072025-03-07T23:30:57.675ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266082025-03-07T23:30:57.675ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266092025-03-07T23:30:57.678ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266102025-03-07T23:30:57.678ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266112025-03-07T23:30:57.679ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266122025-03-07T23:30:57.682ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266132025-03-07T23:30:57.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266142025-03-07T23:30:57.682ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266152025-03-07T23:30:57.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266162025-03-07T23:30:57.684ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266172025-03-07T23:30:57.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266182025-03-07T23:30:57.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266192025-03-07T23:30:57.685ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266202025-03-07T23:30:57.690ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266212025-03-07T23:30:57.690ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266222025-03-07T23:30:57.690ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266232025-03-07T23:30:57.691ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266242025-03-07T23:30:57.697ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266252025-03-07T23:30:57.697ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266262025-03-07T23:30:57.697ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266272025-03-07T23:30:57.697ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Database result = Ok(()) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266282025-03-07T23:30:57.704ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de roles = RoleSet { roles: {} } uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266292025-03-07T23:30:57.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 87a33bee-6823-4ee4-af90-76b9fec98b34, lookup_type: ByName("demo-vpc") } result = Err(ObjectNotFound { type_name: Vpc, lookup_type: ByName("demo-vpc") }) uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266302025-03-07T23:30:57.733ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: vpc with name "demo-vpc" error_message_internal = not found: vpc with name "demo-vpc" latency_us = 105259 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 16eb9ec1-a8ac-4307-8e82-ea57d0f985de response_code = 404 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266312025-03-07T23:30:57.734ZINFOtest_unauthorized (external client test context): client received response status = 404
266322025-03-07T23:30:57.734ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266332025-03-07T23:30:57.734ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266342025-03-07T23:30:57.734ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0d883e-df79-442f-95c5-6348a3fff355 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266352025-03-07T23:30:57.735ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0d883e-df79-442f-95c5-6348a3fff355 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266362025-03-07T23:30:57.735ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0d883e-df79-442f-95c5-6348a3fff355 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266372025-03-07T23:30:57.735ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0d883e-df79-442f-95c5-6348a3fff355 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266382025-03-07T23:30:57.735ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 562 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = be0d883e-df79-442f-95c5-6348a3fff355 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266392025-03-07T23:30:57.735ZINFOtest_unauthorized (external client test context): client received response status = 401
266402025-03-07T23:30:57.736ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266412025-03-07T23:30:57.736ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266422025-03-07T23:30:57.736ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93e011d9-56ef-4046-aeba-3e250b24c0d1 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266432025-03-07T23:30:57.736ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93e011d9-56ef-4046-aeba-3e250b24c0d1 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266442025-03-07T23:30:57.736ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93e011d9-56ef-4046-aeba-3e250b24c0d1 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266452025-03-07T23:30:57.736ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 378 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93e011d9-56ef-4046-aeba-3e250b24c0d1 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266462025-03-07T23:30:57.737ZINFOtest_unauthorized (external client test context): client received response status = 401
266472025-03-07T23:30:57.737ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266482025-03-07T23:30:57.737ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266492025-03-07T23:30:57.737ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d12e1a9-22a0-4fbe-aa23-10d24d3d7985 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266502025-03-07T23:30:57.737ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d12e1a9-22a0-4fbe-aa23-10d24d3d7985 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266512025-03-07T23:30:57.738ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5697:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGateway>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5709:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGateway>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::VpcSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGateway>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d12e1a9-22a0-4fbe-aa23-10d24d3d7985 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266522025-03-07T23:30:57.739ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1083 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d12e1a9-22a0-4fbe-aa23-10d24d3d7985 response_code = 401 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266532025-03-07T23:30:57.739ZINFOtest_unauthorized (external client test context): client received response status = 401
266542025-03-07T23:30:57.739ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266552025-03-07T23:30:57.739ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266562025-03-07T23:30:57.739ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cb9645a4-c0fc-41aa-aec4-0a741eb67992 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266572025-03-07T23:30:57.739ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cb9645a4-c0fc-41aa-aec4-0a741eb67992 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266582025-03-07T23:30:57.739ZINFOtest_unauthorized (external client test context): client received response status = 405
266592025-03-07T23:30:57.739ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266602025-03-07T23:30:57.739ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266612025-03-07T23:30:57.739ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 51ce064b-88a5-45e3-98ee-0ed314ffba08 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266622025-03-07T23:30:57.739ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 51ce064b-88a5-45e3-98ee-0ed314ffba08 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266632025-03-07T23:30:57.739ZINFOtest_unauthorized (external client test context): client received response status = 405
266642025-03-07T23:30:57.740ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266652025-03-07T23:30:57.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266662025-03-07T23:30:57.740ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cbb03998-c8b7-4572-a37b-c5ee832725ee uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266672025-03-07T23:30:57.740ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cbb03998-c8b7-4572-a37b-c5ee832725ee response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266682025-03-07T23:30:57.740ZINFOtest_unauthorized (external client test context): client received response status = 405
266692025-03-07T23:30:57.740ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266702025-03-07T23:30:57.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266712025-03-07T23:30:57.741ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 08178768-dbef-4c68-86c4-cd4d04c878e6 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266722025-03-07T23:30:57.741ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 08178768-dbef-4c68-86c4-cd4d04c878e6 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266732025-03-07T23:30:57.742ZINFOtest_unauthorized (external client test context): client received response status = 405
266742025-03-07T23:30:57.742ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266752025-03-07T23:30:57.742ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266762025-03-07T23:30:57.746ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 56759934-8700-4a4d-98b2-c8b62826b095 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266772025-03-07T23:30:57.746ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 81 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 56759934-8700-4a4d-98b2-c8b62826b095 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266782025-03-07T23:30:57.751ZINFOtest_unauthorized (external client test context): client received response status = 405
266792025-03-07T23:30:57.751ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266802025-03-07T23:30:57.751ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266812025-03-07T23:30:57.751ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 40f85586-5d6c-4159-bfef-1ecd65502523 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266822025-03-07T23:30:57.751ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 40f85586-5d6c-4159-bfef-1ecd65502523 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266832025-03-07T23:30:57.755ZINFOtest_unauthorized (external client test context): client received response status = 405
266842025-03-07T23:30:57.756ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266852025-03-07T23:30:57.756ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266862025-03-07T23:30:57.761ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1364ec67-6278-48fb-a8e8-499b274d7354 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266872025-03-07T23:30:57.761ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 173 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1364ec67-6278-48fb-a8e8-499b274d7354 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266882025-03-07T23:30:57.764ZINFOtest_unauthorized (external client test context): client received response status = 405
266892025-03-07T23:30:57.764ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266902025-03-07T23:30:57.765ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways?project=demo-project&vpc=demo-vpc
266912025-03-07T23:30:57.765ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e0ad5f62-78f7-4c47-87b4-f9bd6135d6f3 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266922025-03-07T23:30:57.765ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 145 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e0ad5f62-78f7-4c47-87b4-f9bd6135d6f3 response_code = 405 uri = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266932025-03-07T23:30:57.767ZINFOtest_unauthorized (external client test context): client received response status = 405
266942025-03-07T23:30:57.767ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateways?project=demo-project&vpc=demo-vpc
266952025-03-07T23:30:57.767ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
266962025-03-07T23:30:57.768ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
266972025-03-07T23:30:57.768ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
266982025-03-07T23:30:57.768ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
266992025-03-07T23:30:57.770ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267002025-03-07T23:30:57.770ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267012025-03-07T23:30:57.770ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267022025-03-07T23:30:57.770ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267032025-03-07T23:30:57.770ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267042025-03-07T23:30:57.771ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267052025-03-07T23:30:57.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267062025-03-07T23:30:57.779ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267072025-03-07T23:30:57.780ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267082025-03-07T23:30:57.783ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
267092025-03-07T23:30:57.784ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
267102025-03-07T23:30:57.784ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267112025-03-07T23:30:57.784ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267122025-03-07T23:30:57.785ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267132025-03-07T23:30:57.787ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
267142025-03-07T23:30:57.787ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
267152025-03-07T23:30:57.787ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
267162025-03-07T23:30:57.788ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267172025-03-07T23:30:57.788ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267182025-03-07T23:30:57.788ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267192025-03-07T23:30:57.791ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
267202025-03-07T23:30:57.795ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
267212025-03-07T23:30:57.795ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267222025-03-07T23:30:57.795ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267232025-03-07T23:30:57.796ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267242025-03-07T23:30:57.798ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
267252025-03-07T23:30:57.799ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
267262025-03-07T23:30:57.800ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267272025-03-07T23:30:57.800ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267282025-03-07T23:30:57.800ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267292025-03-07T23:30:57.808ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
267302025-03-07T23:30:57.808ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
267312025-03-07T23:30:57.808ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
267322025-03-07T23:30:57.809ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
267332025-03-07T23:30:57.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
267342025-03-07T23:30:57.817ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
267352025-03-07T23:30:57.817ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267362025-03-07T23:30:57.817ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267372025-03-07T23:30:57.817ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267382025-03-07T23:30:57.818ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267392025-03-07T23:30:57.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267402025-03-07T23:30:57.829ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267412025-03-07T23:30:57.830ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267422025-03-07T23:30:57.838ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267432025-03-07T23:30:57.838ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267442025-03-07T23:30:57.839ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267452025-03-07T23:30:57.844ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267462025-03-07T23:30:57.844ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267472025-03-07T23:30:57.845ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267482025-03-07T23:30:57.851ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 81071 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ab7b8aac-7286-4e75-92ac-94c8566fea9a response_code = 404 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267492025-03-07T23:30:57.851ZINFOtest_unauthorized (external client test context): client received response status = 404
267502025-03-07T23:30:57.851ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267512025-03-07T23:30:57.851ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267522025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcfc778e-400e-4076-a002-b21b2541c52f uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267532025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcfc778e-400e-4076-a002-b21b2541c52f uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267542025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcfc778e-400e-4076-a002-b21b2541c52f uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267552025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcfc778e-400e-4076-a002-b21b2541c52f uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267562025-03-07T23:30:57.852ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 317 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcfc778e-400e-4076-a002-b21b2541c52f response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267572025-03-07T23:30:57.852ZINFOtest_unauthorized (external client test context): client received response status = 401
267582025-03-07T23:30:57.852ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267592025-03-07T23:30:57.852ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267602025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c405b4d-0acb-40f4-b74b-f4051f7d6670 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267612025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c405b4d-0acb-40f4-b74b-f4051f7d6670 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267622025-03-07T23:30:57.852ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c405b4d-0acb-40f4-b74b-f4051f7d6670 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267632025-03-07T23:30:57.852ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 184 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0c405b4d-0acb-40f4-b74b-f4051f7d6670 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267642025-03-07T23:30:57.853ZINFOtest_unauthorized (external client test context): client received response status = 401
267652025-03-07T23:30:57.853ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267662025-03-07T23:30:57.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267672025-03-07T23:30:57.853ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a49ff314-5174-4dee-93e1-7cbe886ab357 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267682025-03-07T23:30:57.853ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a49ff314-5174-4dee-93e1-7cbe886ab357 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267692025-03-07T23:30:57.854ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5667:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::InternetGateway>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5683:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::InternetGateway>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalVpcSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::InternetGateway>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a49ff314-5174-4dee-93e1-7cbe886ab357 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267702025-03-07T23:30:57.854ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1114 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a49ff314-5174-4dee-93e1-7cbe886ab357 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267712025-03-07T23:30:57.854ZINFOtest_unauthorized (external client test context): client received response status = 401
267722025-03-07T23:30:57.855ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267732025-03-07T23:30:57.855ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267742025-03-07T23:30:57.855ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fdb27f33-4ac0-46f5-85dc-65eccec2ddab uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267752025-03-07T23:30:57.855ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fdb27f33-4ac0-46f5-85dc-65eccec2ddab response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267762025-03-07T23:30:57.855ZINFOtest_unauthorized (external client test context): client received response status = 405
267772025-03-07T23:30:57.855ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267782025-03-07T23:30:57.855ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267792025-03-07T23:30:57.855ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9050aa48-4cc8-4ca8-96a6-5685a5d9e152 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267802025-03-07T23:30:57.855ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9050aa48-4cc8-4ca8-96a6-5685a5d9e152 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267812025-03-07T23:30:57.855ZINFOtest_unauthorized (external client test context): client received response status = 405
267822025-03-07T23:30:57.855ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267832025-03-07T23:30:57.855ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267842025-03-07T23:30:57.855ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17aab93b-4e68-4aaa-9b4b-3f058e293782 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267852025-03-07T23:30:57.856ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17aab93b-4e68-4aaa-9b4b-3f058e293782 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267862025-03-07T23:30:57.856ZINFOtest_unauthorized (external client test context): client received response status = 405
267872025-03-07T23:30:57.856ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267882025-03-07T23:30:57.856ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267892025-03-07T23:30:57.856ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = edefe625-40d5-4546-9dcd-2b371276a6f8 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267902025-03-07T23:30:57.856ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 497 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = edefe625-40d5-4546-9dcd-2b371276a6f8 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267912025-03-07T23:30:57.857ZINFOtest_unauthorized (external client test context): client received response status = 405
267922025-03-07T23:30:57.857ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267932025-03-07T23:30:57.857ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267942025-03-07T23:30:57.857ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4a378e1c-ca7e-4611-90f4-605eef3773d1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267952025-03-07T23:30:57.857ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 4a378e1c-ca7e-4611-90f4-605eef3773d1 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267962025-03-07T23:30:57.857ZINFOtest_unauthorized (external client test context): client received response status = 405
267972025-03-07T23:30:57.857ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267982025-03-07T23:30:57.857ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
267992025-03-07T23:30:57.857ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d410fc6a-99fb-4eb4-a816-b626dc0fd74e uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268002025-03-07T23:30:57.858ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d410fc6a-99fb-4eb4-a816-b626dc0fd74e response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268012025-03-07T23:30:57.858ZINFOtest_unauthorized (external client test context): client received response status = 405
268022025-03-07T23:30:57.858ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268032025-03-07T23:30:57.858ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268042025-03-07T23:30:57.858ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32c04f31-d1f7-473f-9338-83700b567c4c uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268052025-03-07T23:30:57.858ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 136 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32c04f31-d1f7-473f-9338-83700b567c4c response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268062025-03-07T23:30:57.858ZINFOtest_unauthorized (external client test context): client received response status = 405
268072025-03-07T23:30:57.859ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268082025-03-07T23:30:57.859ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268092025-03-07T23:30:57.859ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40efc575-7608-4e60-9688-f483bf2ab3d1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268102025-03-07T23:30:57.859ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40efc575-7608-4e60-9688-f483bf2ab3d1 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268112025-03-07T23:30:57.859ZINFOtest_unauthorized (external client test context): client received response status = 405
268122025-03-07T23:30:57.859ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268132025-03-07T23:30:57.859ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268142025-03-07T23:30:57.859ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268152025-03-07T23:30:57.859ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268162025-03-07T23:30:57.859ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268172025-03-07T23:30:57.860ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268182025-03-07T23:30:57.860ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268192025-03-07T23:30:57.860ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268202025-03-07T23:30:57.866ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268212025-03-07T23:30:57.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268222025-03-07T23:30:57.866ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268232025-03-07T23:30:57.868ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
268242025-03-07T23:30:57.869ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
268252025-03-07T23:30:57.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268262025-03-07T23:30:57.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268272025-03-07T23:30:57.869ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268282025-03-07T23:30:57.872ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
268292025-03-07T23:30:57.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268302025-03-07T23:30:57.872ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268312025-03-07T23:30:57.872ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268322025-03-07T23:30:57.874ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
268332025-03-07T23:30:57.878ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
268342025-03-07T23:30:57.878ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268352025-03-07T23:30:57.878ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268362025-03-07T23:30:57.879ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268372025-03-07T23:30:57.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
268382025-03-07T23:30:57.881ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
268392025-03-07T23:30:57.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268402025-03-07T23:30:57.881ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268412025-03-07T23:30:57.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268422025-03-07T23:30:57.884ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
268432025-03-07T23:30:57.884ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
268442025-03-07T23:30:57.884ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
268452025-03-07T23:30:57.884ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
268462025-03-07T23:30:57.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
268472025-03-07T23:30:57.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
268482025-03-07T23:30:57.897ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268492025-03-07T23:30:57.897ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268502025-03-07T23:30:57.897ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268512025-03-07T23:30:57.897ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268522025-03-07T23:30:57.900ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268532025-03-07T23:30:57.900ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268542025-03-07T23:30:57.901ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268552025-03-07T23:30:57.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268562025-03-07T23:30:57.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268572025-03-07T23:30:57.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268582025-03-07T23:30:57.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268592025-03-07T23:30:57.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 roles = RoleSet { roles: {} } uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268602025-03-07T23:30:57.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 resource = Database result = Ok(()) uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268612025-03-07T23:30:57.908ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 48961 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6ca74959-1551-4714-a3ae-2ff84b575155 response_code = 404 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268622025-03-07T23:30:57.909ZINFOtest_unauthorized (external client test context): client received response status = 404
268632025-03-07T23:30:57.909ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268642025-03-07T23:30:57.909ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268652025-03-07T23:30:57.909ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e6fb5d6b-cda6-404c-8151-73712356b6f1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268662025-03-07T23:30:57.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e6fb5d6b-cda6-404c-8151-73712356b6f1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268672025-03-07T23:30:57.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e6fb5d6b-cda6-404c-8151-73712356b6f1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268682025-03-07T23:30:57.910ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e6fb5d6b-cda6-404c-8151-73712356b6f1 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268692025-03-07T23:30:57.910ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 346 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e6fb5d6b-cda6-404c-8151-73712356b6f1 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268702025-03-07T23:30:57.910ZINFOtest_unauthorized (external client test context): client received response status = 401
268712025-03-07T23:30:57.910ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268722025-03-07T23:30:57.910ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268732025-03-07T23:30:57.910ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3114f29d-af16-4cdc-807f-c761eb4bab85 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268742025-03-07T23:30:57.910ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3114f29d-af16-4cdc-807f-c761eb4bab85 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268752025-03-07T23:30:57.910ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3114f29d-af16-4cdc-807f-c761eb4bab85 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268762025-03-07T23:30:57.910ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 198 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3114f29d-af16-4cdc-807f-c761eb4bab85 response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268772025-03-07T23:30:57.911ZINFOtest_unauthorized (external client test context): client received response status = 401
268782025-03-07T23:30:57.911ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268792025-03-07T23:30:57.911ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268802025-03-07T23:30:57.911ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 30c64af6-692a-417a-98b6-51cf548bb57b uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268812025-03-07T23:30:57.911ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 30c64af6-692a-417a-98b6-51cf548bb57b uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268822025-03-07T23:30:57.916ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5724:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5740:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InternetGatewayPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewayDeleteSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 30c64af6-692a-417a-98b6-51cf548bb57b uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268832025-03-07T23:30:57.916ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 4475 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 30c64af6-692a-417a-98b6-51cf548bb57b response_code = 401 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268842025-03-07T23:30:57.916ZINFOtest_unauthorized (external client test context): client received response status = 401
268852025-03-07T23:30:57.916ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268862025-03-07T23:30:57.916ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268872025-03-07T23:30:57.916ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8ce33c1e-fa88-44d1-978a-953c3c8d74af uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268882025-03-07T23:30:57.916ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8ce33c1e-fa88-44d1-978a-953c3c8d74af response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268892025-03-07T23:30:57.917ZINFOtest_unauthorized (external client test context): client received response status = 405
268902025-03-07T23:30:57.917ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268912025-03-07T23:30:57.918ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268922025-03-07T23:30:57.918ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2cda2d1f-1891-4920-8629-88a3dfd6e390 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268932025-03-07T23:30:57.919ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 857 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2cda2d1f-1891-4920-8629-88a3dfd6e390 response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268942025-03-07T23:30:57.919ZINFOtest_unauthorized (external client test context): client received response status = 405
268952025-03-07T23:30:57.919ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268962025-03-07T23:30:57.919ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268972025-03-07T23:30:57.920ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c5ac36c8-c55c-4fb0-b0e6-c07897c69b3b uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268982025-03-07T23:30:57.920ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c5ac36c8-c55c-4fb0-b0e6-c07897c69b3b response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
268992025-03-07T23:30:57.920ZINFOtest_unauthorized (external client test context): client received response status = 405
269002025-03-07T23:30:57.920ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
269012025-03-07T23:30:57.921ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
269022025-03-07T23:30:57.921ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 60cae02b-7789-4556-ab3c-178bd5cbef1d uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
269032025-03-07T23:30:57.921ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 143 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 60cae02b-7789-4556-ab3c-178bd5cbef1d response_code = 405 uri = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
269042025-03-07T23:30:57.921ZINFOtest_unauthorized (external client test context): client received response status = 405
269052025-03-07T23:30:57.921ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateways/demo-internet-gateway?project=demo-project&vpc=demo-vpc
269062025-03-07T23:30:57.922ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269072025-03-07T23:30:57.922ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269082025-03-07T23:30:57.922ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269092025-03-07T23:30:57.922ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269102025-03-07T23:30:57.922ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269112025-03-07T23:30:57.923ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269122025-03-07T23:30:57.923ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269132025-03-07T23:30:57.923ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269142025-03-07T23:30:57.923ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269152025-03-07T23:30:57.924ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269162025-03-07T23:30:57.937ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269172025-03-07T23:30:57.937ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269182025-03-07T23:30:57.937ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269192025-03-07T23:30:57.942ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
269202025-03-07T23:30:57.942ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
269212025-03-07T23:30:57.943ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269222025-03-07T23:30:57.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269232025-03-07T23:30:57.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269242025-03-07T23:30:57.947ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
269252025-03-07T23:30:57.947ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269262025-03-07T23:30:57.947ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269272025-03-07T23:30:57.948ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269282025-03-07T23:30:57.955ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
269292025-03-07T23:30:57.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
269302025-03-07T23:30:57.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269312025-03-07T23:30:57.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269322025-03-07T23:30:57.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269332025-03-07T23:30:57.961ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
269342025-03-07T23:30:57.961ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
269352025-03-07T23:30:57.962ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269362025-03-07T23:30:57.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269372025-03-07T23:30:57.962ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269382025-03-07T23:30:57.975ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
269392025-03-07T23:30:57.975ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
269402025-03-07T23:30:57.975ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
269412025-03-07T23:30:57.976ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
269422025-03-07T23:30:57.982ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
269432025-03-07T23:30:57.988ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
269442025-03-07T23:30:57.988ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269452025-03-07T23:30:57.989ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269462025-03-07T23:30:57.989ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269472025-03-07T23:30:57.990ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269482025-03-07T23:30:58.020ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269492025-03-07T23:30:58.020ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269502025-03-07T23:30:58.020ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269512025-03-07T23:30:58.026ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269522025-03-07T23:30:58.026ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269532025-03-07T23:30:58.027ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269542025-03-07T23:30:58.030ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269552025-03-07T23:30:58.030ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269562025-03-07T23:30:58.031ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269572025-03-07T23:30:58.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 110586 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f196babb-b0fd-46fc-91e6-b958bb3d6ca8 response_code = 404 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269582025-03-07T23:30:58.033ZINFOtest_unauthorized (external client test context): client received response status = 404
269592025-03-07T23:30:58.033ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269602025-03-07T23:30:58.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269612025-03-07T23:30:58.034ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9c9f3ef-9706-4240-8b0b-9e0140647935 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269622025-03-07T23:30:58.034ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9c9f3ef-9706-4240-8b0b-9e0140647935 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269632025-03-07T23:30:58.034ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9c9f3ef-9706-4240-8b0b-9e0140647935 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269642025-03-07T23:30:58.034ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9c9f3ef-9706-4240-8b0b-9e0140647935 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269652025-03-07T23:30:58.034ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 335 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b9c9f3ef-9706-4240-8b0b-9e0140647935 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269662025-03-07T23:30:58.034ZINFOtest_unauthorized (external client test context): client received response status = 401
269672025-03-07T23:30:58.034ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269682025-03-07T23:30:58.034ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269692025-03-07T23:30:58.035ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4dd2da02-b9c6-4a04-9da6-2838c3ab27d6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269702025-03-07T23:30:58.035ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4dd2da02-b9c6-4a04-9da6-2838c3ab27d6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269712025-03-07T23:30:58.035ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4dd2da02-b9c6-4a04-9da6-2838c3ab27d6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269722025-03-07T23:30:58.035ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 233 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4dd2da02-b9c6-4a04-9da6-2838c3ab27d6 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269732025-03-07T23:30:58.036ZINFOtest_unauthorized (external client test context): client received response status = 401
269742025-03-07T23:30:58.036ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269752025-03-07T23:30:58.037ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269762025-03-07T23:30:58.037ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b2d52997-b4f1-4f58-9a13-020238985eb6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269772025-03-07T23:30:58.037ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b2d52997-b4f1-4f58-9a13-020238985eb6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269782025-03-07T23:30:58.039ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5756:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpPool>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5782:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpPool>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpPool>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b2d52997-b4f1-4f58-9a13-020238985eb6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269792025-03-07T23:30:58.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1550 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b2d52997-b4f1-4f58-9a13-020238985eb6 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269802025-03-07T23:30:58.039ZINFOtest_unauthorized (external client test context): client received response status = 401
269812025-03-07T23:30:58.040ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269822025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269832025-03-07T23:30:58.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4cbe0142-059e-49ce-9194-1487c23eab27 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269842025-03-07T23:30:58.040ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4cbe0142-059e-49ce-9194-1487c23eab27 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269852025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client received response status = 405
269862025-03-07T23:30:58.040ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269872025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269882025-03-07T23:30:58.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b9e3070e-0412-477c-b89b-70728dcf7842 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269892025-03-07T23:30:58.040ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b9e3070e-0412-477c-b89b-70728dcf7842 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269902025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client received response status = 405
269912025-03-07T23:30:58.040ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269922025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269932025-03-07T23:30:58.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 47a8a9dc-240a-43b4-a4b1-37a5eb0b5dca uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269942025-03-07T23:30:58.040ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 47a8a9dc-240a-43b4-a4b1-37a5eb0b5dca response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269952025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client received response status = 405
269962025-03-07T23:30:58.040ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269972025-03-07T23:30:58.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269982025-03-07T23:30:58.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 03873010-fa73-43ea-adc7-30678f3679a5 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
269992025-03-07T23:30:58.040ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 03873010-fa73-43ea-adc7-30678f3679a5 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270002025-03-07T23:30:58.050ZINFOtest_unauthorized (external client test context): client received response status = 405
270012025-03-07T23:30:58.050ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270022025-03-07T23:30:58.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270032025-03-07T23:30:58.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270042025-03-07T23:30:58.050ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270052025-03-07T23:30:58.050ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270062025-03-07T23:30:58.050ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270072025-03-07T23:30:58.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270082025-03-07T23:30:58.050ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270092025-03-07T23:30:58.053ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270102025-03-07T23:30:58.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270112025-03-07T23:30:58.053ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270122025-03-07T23:30:58.055ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
270132025-03-07T23:30:58.055ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
270142025-03-07T23:30:58.055ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270152025-03-07T23:30:58.055ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270162025-03-07T23:30:58.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270172025-03-07T23:30:58.059ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
270182025-03-07T23:30:58.059ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270192025-03-07T23:30:58.059ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270202025-03-07T23:30:58.060ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270212025-03-07T23:30:58.062ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
270222025-03-07T23:30:58.066ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
270232025-03-07T23:30:58.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270242025-03-07T23:30:58.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270252025-03-07T23:30:58.066ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270262025-03-07T23:30:58.068ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
270272025-03-07T23:30:58.068ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
270282025-03-07T23:30:58.068ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270292025-03-07T23:30:58.068ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270302025-03-07T23:30:58.069ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270312025-03-07T23:30:58.071ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
270322025-03-07T23:30:58.071ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
270332025-03-07T23:30:58.071ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
270342025-03-07T23:30:58.072ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
270352025-03-07T23:30:58.074ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
270362025-03-07T23:30:58.085ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
270372025-03-07T23:30:58.086ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270382025-03-07T23:30:58.086ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270392025-03-07T23:30:58.086ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270402025-03-07T23:30:58.086ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270412025-03-07T23:30:58.105ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270422025-03-07T23:30:58.105ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270432025-03-07T23:30:58.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270442025-03-07T23:30:58.113ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270452025-03-07T23:30:58.114ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270462025-03-07T23:30:58.115ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270472025-03-07T23:30:58.119ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270482025-03-07T23:30:58.119ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270492025-03-07T23:30:58.121ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270502025-03-07T23:30:58.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 93145 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = da2f9d2a-4c5b-4dac-963f-9f06b64606f1 response_code = 404 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270512025-03-07T23:30:58.137ZINFOtest_unauthorized (external client test context): client received response status = 404
270522025-03-07T23:30:58.137ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270532025-03-07T23:30:58.137ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270542025-03-07T23:30:58.137ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a46d18fc-5ed4-4f2c-913b-4127e2aa6a88 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270552025-03-07T23:30:58.137ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a46d18fc-5ed4-4f2c-913b-4127e2aa6a88 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270562025-03-07T23:30:58.137ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a46d18fc-5ed4-4f2c-913b-4127e2aa6a88 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270572025-03-07T23:30:58.138ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a46d18fc-5ed4-4f2c-913b-4127e2aa6a88 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270582025-03-07T23:30:58.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 437 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a46d18fc-5ed4-4f2c-913b-4127e2aa6a88 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270592025-03-07T23:30:58.138ZINFOtest_unauthorized (external client test context): client received response status = 401
270602025-03-07T23:30:58.138ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270612025-03-07T23:30:58.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270622025-03-07T23:30:58.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 83b5c30e-26be-4b46-b11c-862d82905fa0 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270632025-03-07T23:30:58.139ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 83b5c30e-26be-4b46-b11c-862d82905fa0 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270642025-03-07T23:30:58.139ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 83b5c30e-26be-4b46-b11c-862d82905fa0 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270652025-03-07T23:30:58.139ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 257 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 83b5c30e-26be-4b46-b11c-862d82905fa0 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270662025-03-07T23:30:58.139ZINFOtest_unauthorized (external client test context): client received response status = 401
270672025-03-07T23:30:58.139ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270682025-03-07T23:30:58.139ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270692025-03-07T23:30:58.139ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f5c84a20-b081-4a18-ac7b-200d2eaf5b24 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270702025-03-07T23:30:58.139ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f5c84a20-b081-4a18-ac7b-200d2eaf5b24 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270712025-03-07T23:30:58.141ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5795:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpPool>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5809:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpPool>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpPoolCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpPool>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f5c84a20-b081-4a18-ac7b-200d2eaf5b24 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270722025-03-07T23:30:58.141ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1129 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f5c84a20-b081-4a18-ac7b-200d2eaf5b24 response_code = 401 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270732025-03-07T23:30:58.141ZINFOtest_unauthorized (external client test context): client received response status = 401
270742025-03-07T23:30:58.141ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270752025-03-07T23:30:58.141ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270762025-03-07T23:30:58.141ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ae30f7eb-707e-4dd5-88e9-9724ccc85e72 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270772025-03-07T23:30:58.141ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ae30f7eb-707e-4dd5-88e9-9724ccc85e72 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270782025-03-07T23:30:58.141ZINFOtest_unauthorized (external client test context): client received response status = 405
270792025-03-07T23:30:58.141ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270802025-03-07T23:30:58.141ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270812025-03-07T23:30:58.141ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 991ead18-4953-4f2b-87e0-bc95b6de2c91 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270822025-03-07T23:30:58.141ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 991ead18-4953-4f2b-87e0-bc95b6de2c91 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270832025-03-07T23:30:58.142ZINFOtest_unauthorized (external client test context): client received response status = 405
270842025-03-07T23:30:58.142ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270852025-03-07T23:30:58.142ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270862025-03-07T23:30:58.142ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a105732e-d6b1-45e9-9d7c-e9921471a6f6 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270872025-03-07T23:30:58.142ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a105732e-d6b1-45e9-9d7c-e9921471a6f6 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270882025-03-07T23:30:58.142ZINFOtest_unauthorized (external client test context): client received response status = 405
270892025-03-07T23:30:58.143ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270902025-03-07T23:30:58.143ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270912025-03-07T23:30:58.143ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2d86fb53-8475-4da3-aa72-a6ee3e5015fa uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270922025-03-07T23:30:58.143ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2d86fb53-8475-4da3-aa72-a6ee3e5015fa response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270932025-03-07T23:30:58.143ZINFOtest_unauthorized (external client test context): client received response status = 405
270942025-03-07T23:30:58.143ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270952025-03-07T23:30:58.143ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270962025-03-07T23:30:58.143ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0609fdab-c9d8-413b-bcc5-3c403b41f63f uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270972025-03-07T23:30:58.143ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0609fdab-c9d8-413b-bcc5-3c403b41f63f response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
270982025-03-07T23:30:58.144ZINFOtest_unauthorized (external client test context): client received response status = 405
270992025-03-07T23:30:58.144ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271002025-03-07T23:30:58.144ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271012025-03-07T23:30:58.144ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3ffb262f-80e9-41c6-882f-0264599ae058 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271022025-03-07T23:30:58.144ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3ffb262f-80e9-41c6-882f-0264599ae058 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271032025-03-07T23:30:58.145ZINFOtest_unauthorized (external client test context): client received response status = 405
271042025-03-07T23:30:58.145ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271052025-03-07T23:30:58.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271062025-03-07T23:30:58.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 68bc7d10-94b2-4f61-be4a-59c9dba9b6ce uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271072025-03-07T23:30:58.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 68bc7d10-94b2-4f61-be4a-59c9dba9b6ce response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271082025-03-07T23:30:58.145ZINFOtest_unauthorized (external client test context): client received response status = 405
271092025-03-07T23:30:58.145ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271102025-03-07T23:30:58.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271112025-03-07T23:30:58.146ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dc1344e4-42f8-4bf8-b46b-f86b51e8ce22 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271122025-03-07T23:30:58.146ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dc1344e4-42f8-4bf8-b46b-f86b51e8ce22 response_code = 405 uri = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271132025-03-07T23:30:58.146ZINFOtest_unauthorized (external client test context): client received response status = 405
271142025-03-07T23:30:58.146ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-pools?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271152025-03-07T23:30:58.146ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271162025-03-07T23:30:58.146ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271172025-03-07T23:30:58.146ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271182025-03-07T23:30:58.146ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271192025-03-07T23:30:58.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e15c79d5-72cb-40b4-a1a6-fc8561a7fc5a uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271202025-03-07T23:30:58.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e15c79d5-72cb-40b4-a1a6-fc8561a7fc5a response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271212025-03-07T23:30:58.147ZINFOtest_unauthorized (external client test context): client received response status = 405
271222025-03-07T23:30:58.147ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271232025-03-07T23:30:58.147ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271242025-03-07T23:30:58.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6613e8df-7a8d-4842-a113-62bd6fe67c40 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271252025-03-07T23:30:58.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6613e8df-7a8d-4842-a113-62bd6fe67c40 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271262025-03-07T23:30:58.147ZINFOtest_unauthorized (external client test context): client received response status = 405
271272025-03-07T23:30:58.147ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271282025-03-07T23:30:58.147ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271292025-03-07T23:30:58.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3013cde3-72e3-47a9-a17a-6c87e157964a uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271302025-03-07T23:30:58.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3013cde3-72e3-47a9-a17a-6c87e157964a response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271312025-03-07T23:30:58.148ZINFOtest_unauthorized (external client test context): client received response status = 405
271322025-03-07T23:30:58.148ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271332025-03-07T23:30:58.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271342025-03-07T23:30:58.148ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c4c53cd-3c3d-4296-9953-5f38af9f28f6 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271352025-03-07T23:30:58.148ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c4c53cd-3c3d-4296-9953-5f38af9f28f6 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271362025-03-07T23:30:58.148ZINFOtest_unauthorized (external client test context): client received response status = 405
271372025-03-07T23:30:58.148ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271382025-03-07T23:30:58.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271392025-03-07T23:30:58.148ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 92cfaec6-2e1d-4343-873e-b21f64e268be uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271402025-03-07T23:30:58.148ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 92cfaec6-2e1d-4343-873e-b21f64e268be response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271412025-03-07T23:30:58.149ZINFOtest_unauthorized (external client test context): client received response status = 405
271422025-03-07T23:30:58.149ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271432025-03-07T23:30:58.152ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271442025-03-07T23:30:58.152ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 67e1c0a5-0d70-4fb6-aaed-31bb4e97267b uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271452025-03-07T23:30:58.152ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 67e1c0a5-0d70-4fb6-aaed-31bb4e97267b response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271462025-03-07T23:30:58.152ZINFOtest_unauthorized (external client test context): client received response status = 405
271472025-03-07T23:30:58.152ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271482025-03-07T23:30:58.152ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271492025-03-07T23:30:58.152ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d5c6713e-a041-41df-9905-e282c7a5e8fa uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271502025-03-07T23:30:58.153ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d5c6713e-a041-41df-9905-e282c7a5e8fa response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271512025-03-07T23:30:58.153ZINFOtest_unauthorized (external client test context): client received response status = 405
271522025-03-07T23:30:58.153ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271532025-03-07T23:30:58.153ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271542025-03-07T23:30:58.153ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ad9ed9d2-c25e-49e9-a643-726bbb6faf40 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271552025-03-07T23:30:58.153ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ad9ed9d2-c25e-49e9-a643-726bbb6faf40 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271562025-03-07T23:30:58.153ZINFOtest_unauthorized (external client test context): client received response status = 405
271572025-03-07T23:30:58.153ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271582025-03-07T23:30:58.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271592025-03-07T23:30:58.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6e44280-e35a-4174-bbb9-5d929c75a2cd uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271602025-03-07T23:30:58.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b6e44280-e35a-4174-bbb9-5d929c75a2cd response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271612025-03-07T23:30:58.154ZINFOtest_unauthorized (external client test context): client received response status = 405
271622025-03-07T23:30:58.154ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271632025-03-07T23:30:58.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271642025-03-07T23:30:58.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1c5f9e2d-e35d-4298-84bb-2111956121dc uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271652025-03-07T23:30:58.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1c5f9e2d-e35d-4298-84bb-2111956121dc response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271662025-03-07T23:30:58.155ZINFOtest_unauthorized (external client test context): client received response status = 405
271672025-03-07T23:30:58.155ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271682025-03-07T23:30:58.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271692025-03-07T23:30:58.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dd06b19a-7c22-447b-9c4c-3b5d9bfaac94 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271702025-03-07T23:30:58.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = dd06b19a-7c22-447b-9c4c-3b5d9bfaac94 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271712025-03-07T23:30:58.155ZINFOtest_unauthorized (external client test context): client received response status = 405
271722025-03-07T23:30:58.155ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271732025-03-07T23:30:58.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271742025-03-07T23:30:58.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5b2c0fdb-f161-4e83-a37e-f131e2dfd5c9 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271752025-03-07T23:30:58.156ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5b2c0fdb-f161-4e83-a37e-f131e2dfd5c9 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271762025-03-07T23:30:58.156ZINFOtest_unauthorized (external client test context): client received response status = 405
271772025-03-07T23:30:58.156ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271782025-03-07T23:30:58.156ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271792025-03-07T23:30:58.156ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271802025-03-07T23:30:58.156ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271812025-03-07T23:30:58.156ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
271822025-03-07T23:30:58.156ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271832025-03-07T23:30:58.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271842025-03-07T23:30:58.157ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271852025-03-07T23:30:58.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
271862025-03-07T23:30:58.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
271872025-03-07T23:30:58.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
271882025-03-07T23:30:58.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
271892025-03-07T23:30:58.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271902025-03-07T23:30:58.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271912025-03-07T23:30:58.162ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271922025-03-07T23:30:58.163ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
271932025-03-07T23:30:58.163ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
271942025-03-07T23:30:58.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
271952025-03-07T23:30:58.165ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
271962025-03-07T23:30:58.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
271972025-03-07T23:30:58.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
271982025-03-07T23:30:58.166ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
271992025-03-07T23:30:58.167ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
272002025-03-07T23:30:58.167ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
272012025-03-07T23:30:58.168ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
272022025-03-07T23:30:58.168ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272032025-03-07T23:30:58.168ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272042025-03-07T23:30:58.169ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272052025-03-07T23:30:58.171ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
272062025-03-07T23:30:58.174ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
272072025-03-07T23:30:58.174ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272082025-03-07T23:30:58.175ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272092025-03-07T23:30:58.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272102025-03-07T23:30:58.177ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
272112025-03-07T23:30:58.177ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
272122025-03-07T23:30:58.177ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272132025-03-07T23:30:58.177ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272142025-03-07T23:30:58.178ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272152025-03-07T23:30:58.183ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
272162025-03-07T23:30:58.184ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272172025-03-07T23:30:58.185ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272182025-03-07T23:30:58.185ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272192025-03-07T23:30:58.187ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
272202025-03-07T23:30:58.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
272212025-03-07T23:30:58.196ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272222025-03-07T23:30:58.196ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272232025-03-07T23:30:58.196ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272242025-03-07T23:30:58.197ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272252025-03-07T23:30:58.206ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272262025-03-07T23:30:58.206ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272272025-03-07T23:30:58.207ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272282025-03-07T23:30:58.210ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272292025-03-07T23:30:58.211ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272302025-03-07T23:30:58.212ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272312025-03-07T23:30:58.215ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272322025-03-07T23:30:58.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272332025-03-07T23:30:58.217ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272342025-03-07T23:30:58.219ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 63442 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f8833f10-ed6d-4b7d-91fd-55634351f737 response_code = 404 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272352025-03-07T23:30:58.220ZINFOtest_unauthorized (external client test context): client received response status = 404
272362025-03-07T23:30:58.220ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272372025-03-07T23:30:58.220ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272382025-03-07T23:30:58.220ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0a5b1aaf-5b9f-4af3-b613-10b6337a814c uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272392025-03-07T23:30:58.221ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0a5b1aaf-5b9f-4af3-b613-10b6337a814c uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272402025-03-07T23:30:58.221ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0a5b1aaf-5b9f-4af3-b613-10b6337a814c uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272412025-03-07T23:30:58.221ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0a5b1aaf-5b9f-4af3-b613-10b6337a814c uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272422025-03-07T23:30:58.221ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 331 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0a5b1aaf-5b9f-4af3-b613-10b6337a814c response_code = 401 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272432025-03-07T23:30:58.221ZINFOtest_unauthorized (external client test context): client received response status = 401
272442025-03-07T23:30:58.221ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272452025-03-07T23:30:58.221ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272462025-03-07T23:30:58.221ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2bee4fae-9cc3-4900-a7bd-537ea282c8ad uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272472025-03-07T23:30:58.221ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2bee4fae-9cc3-4900-a7bd-537ea282c8ad uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272482025-03-07T23:30:58.221ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2bee4fae-9cc3-4900-a7bd-537ea282c8ad uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272492025-03-07T23:30:58.221ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 203 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2bee4fae-9cc3-4900-a7bd-537ea282c8ad response_code = 401 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272502025-03-07T23:30:58.222ZINFOtest_unauthorized (external client test context): client received response status = 401
272512025-03-07T23:30:58.222ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272522025-03-07T23:30:58.222ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272532025-03-07T23:30:58.222ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 202098ab-5fc5-41dd-ad34-09efaf404ce2 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272542025-03-07T23:30:58.222ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 202098ab-5fc5-41dd-ad34-09efaf404ce2 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272552025-03-07T23:30:58.224ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5821:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5842:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_pool_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpPoolPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 202098ab-5fc5-41dd-ad34-09efaf404ce2 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272562025-03-07T23:30:58.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1461 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 202098ab-5fc5-41dd-ad34-09efaf404ce2 response_code = 401 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272572025-03-07T23:30:58.224ZINFOtest_unauthorized (external client test context): client received response status = 401
272582025-03-07T23:30:58.224ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272592025-03-07T23:30:58.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272602025-03-07T23:30:58.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a0695c4e-e77f-417a-b150-e6dee48e75be uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272612025-03-07T23:30:58.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a0695c4e-e77f-417a-b150-e6dee48e75be response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272622025-03-07T23:30:58.224ZINFOtest_unauthorized (external client test context): client received response status = 405
272632025-03-07T23:30:58.224ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272642025-03-07T23:30:58.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272652025-03-07T23:30:58.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fdc9aa59-e553-4844-adee-4588998768e7 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272662025-03-07T23:30:58.224ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fdc9aa59-e553-4844-adee-4588998768e7 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272672025-03-07T23:30:58.225ZINFOtest_unauthorized (external client test context): client received response status = 405
272682025-03-07T23:30:58.225ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272692025-03-07T23:30:58.225ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272702025-03-07T23:30:58.225ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d4914fdd-b1d0-4758-b814-1e5834f8f7a2 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272712025-03-07T23:30:58.225ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d4914fdd-b1d0-4758-b814-1e5834f8f7a2 response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272722025-03-07T23:30:58.225ZINFOtest_unauthorized (external client test context): client received response status = 405
272732025-03-07T23:30:58.225ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272742025-03-07T23:30:58.225ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272752025-03-07T23:30:58.225ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 01883e1b-0f39-48df-b7bc-618b70dc480b uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272762025-03-07T23:30:58.225ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 01883e1b-0f39-48df-b7bc-618b70dc480b response_code = 405 uri = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272772025-03-07T23:30:58.226ZINFOtest_unauthorized (external client test context): client received response status = 405
272782025-03-07T23:30:58.226ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-pools/demo-igw-pool?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272792025-03-07T23:30:58.226ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272802025-03-07T23:30:58.226ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272812025-03-07T23:30:58.226ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272822025-03-07T23:30:58.226ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272832025-03-07T23:30:58.226ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272842025-03-07T23:30:58.226ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272852025-03-07T23:30:58.226ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
272862025-03-07T23:30:58.226ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272872025-03-07T23:30:58.227ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272882025-03-07T23:30:58.228ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272892025-03-07T23:30:58.235ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272902025-03-07T23:30:58.236ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272912025-03-07T23:30:58.237ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272922025-03-07T23:30:58.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
272932025-03-07T23:30:58.244ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
272942025-03-07T23:30:58.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272952025-03-07T23:30:58.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
272962025-03-07T23:30:58.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
272972025-03-07T23:30:58.248ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
272982025-03-07T23:30:58.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
272992025-03-07T23:30:58.248ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273002025-03-07T23:30:58.249ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273012025-03-07T23:30:58.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
273022025-03-07T23:30:58.255ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
273032025-03-07T23:30:58.255ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273042025-03-07T23:30:58.255ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273052025-03-07T23:30:58.256ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273062025-03-07T23:30:58.259ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
273072025-03-07T23:30:58.259ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
273082025-03-07T23:30:58.259ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
273092025-03-07T23:30:58.259ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273102025-03-07T23:30:58.259ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273112025-03-07T23:30:58.260ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273122025-03-07T23:30:58.262ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
273132025-03-07T23:30:58.262ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273142025-03-07T23:30:58.262ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273152025-03-07T23:30:58.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273162025-03-07T23:30:58.265ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
273172025-03-07T23:30:58.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
273182025-03-07T23:30:58.270ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273192025-03-07T23:30:58.270ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273202025-03-07T23:30:58.270ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273212025-03-07T23:30:58.271ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273222025-03-07T23:30:58.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273232025-03-07T23:30:58.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273242025-03-07T23:30:58.274ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273252025-03-07T23:30:58.277ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273262025-03-07T23:30:58.277ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273272025-03-07T23:30:58.277ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273282025-03-07T23:30:58.280ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273292025-03-07T23:30:58.280ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273302025-03-07T23:30:58.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273312025-03-07T23:30:58.283ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 57496 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ad75704a-e85e-4ded-a94a-1d9c894ae758 response_code = 404 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273322025-03-07T23:30:58.285ZINFOtest_unauthorized (external client test context): client received response status = 404
273332025-03-07T23:30:58.285ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273342025-03-07T23:30:58.285ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273352025-03-07T23:30:58.286ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 925cf33b-39e7-49c8-852e-b1833e64fab2 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273362025-03-07T23:30:58.286ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 925cf33b-39e7-49c8-852e-b1833e64fab2 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273372025-03-07T23:30:58.286ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 925cf33b-39e7-49c8-852e-b1833e64fab2 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273382025-03-07T23:30:58.287ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 925cf33b-39e7-49c8-852e-b1833e64fab2 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273392025-03-07T23:30:58.287ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 419 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 925cf33b-39e7-49c8-852e-b1833e64fab2 response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273402025-03-07T23:30:58.287ZINFOtest_unauthorized (external client test context): client received response status = 401
273412025-03-07T23:30:58.287ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273422025-03-07T23:30:58.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273432025-03-07T23:30:58.287ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 21b90864-2d8c-4e00-a1e1-b2a12cef1045 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273442025-03-07T23:30:58.287ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 21b90864-2d8c-4e00-a1e1-b2a12cef1045 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273452025-03-07T23:30:58.287ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 21b90864-2d8c-4e00-a1e1-b2a12cef1045 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273462025-03-07T23:30:58.287ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 168 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 21b90864-2d8c-4e00-a1e1-b2a12cef1045 response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273472025-03-07T23:30:58.287ZINFOtest_unauthorized (external client test context): client received response status = 401
273482025-03-07T23:30:58.287ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273492025-03-07T23:30:58.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273502025-03-07T23:30:58.288ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 684b9b92-67c3-4423-a876-376a85154938 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273512025-03-07T23:30:58.288ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 684b9b92-67c3-4423-a876-376a85154938 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273522025-03-07T23:30:58.289ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5858:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpAddress>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5888:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpAddress>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InternetGatewaySelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::InternetGatewayIpAddress>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 684b9b92-67c3-4423-a876-376a85154938 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273532025-03-07T23:30:58.289ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1083 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 684b9b92-67c3-4423-a876-376a85154938 response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273542025-03-07T23:30:58.289ZINFOtest_unauthorized (external client test context): client received response status = 401
273552025-03-07T23:30:58.289ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273562025-03-07T23:30:58.289ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273572025-03-07T23:30:58.289ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dfcaa12a-5e7a-4608-9489-2b2ae60eba48 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273582025-03-07T23:30:58.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dfcaa12a-5e7a-4608-9489-2b2ae60eba48 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273592025-03-07T23:30:58.290ZINFOtest_unauthorized (external client test context): client received response status = 405
273602025-03-07T23:30:58.290ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273612025-03-07T23:30:58.290ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273622025-03-07T23:30:58.290ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 04deba70-6e60-469c-b95c-08974eca5224 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273632025-03-07T23:30:58.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 04deba70-6e60-469c-b95c-08974eca5224 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273642025-03-07T23:30:58.291ZINFOtest_unauthorized (external client test context): client received response status = 405
273652025-03-07T23:30:58.291ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273662025-03-07T23:30:58.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273672025-03-07T23:30:58.291ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e0baed31-955b-4a45-a64a-8770cc33ea8a uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273682025-03-07T23:30:58.292ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e0baed31-955b-4a45-a64a-8770cc33ea8a response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273692025-03-07T23:30:58.292ZINFOtest_unauthorized (external client test context): client received response status = 405
273702025-03-07T23:30:58.292ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273712025-03-07T23:30:58.292ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273722025-03-07T23:30:58.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9d8ce34b-a61b-40bb-8f06-73dc7ae1f411 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273732025-03-07T23:30:58.292ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9d8ce34b-a61b-40bb-8f06-73dc7ae1f411 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273742025-03-07T23:30:58.292ZINFOtest_unauthorized (external client test context): client received response status = 405
273752025-03-07T23:30:58.293ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273762025-03-07T23:30:58.293ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273772025-03-07T23:30:58.293ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273782025-03-07T23:30:58.293ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273792025-03-07T23:30:58.294ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
273802025-03-07T23:30:58.294ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273812025-03-07T23:30:58.294ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273822025-03-07T23:30:58.295ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273832025-03-07T23:30:58.298ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273842025-03-07T23:30:58.298ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273852025-03-07T23:30:58.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273862025-03-07T23:30:58.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
273872025-03-07T23:30:58.303ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
273882025-03-07T23:30:58.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273892025-03-07T23:30:58.303ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273902025-03-07T23:30:58.303ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273912025-03-07T23:30:58.305ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
273922025-03-07T23:30:58.305ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273932025-03-07T23:30:58.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273942025-03-07T23:30:58.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
273952025-03-07T23:30:58.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
273962025-03-07T23:30:58.312ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
273972025-03-07T23:30:58.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
273982025-03-07T23:30:58.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
273992025-03-07T23:30:58.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274002025-03-07T23:30:58.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
274012025-03-07T23:30:58.326ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
274022025-03-07T23:30:58.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274032025-03-07T23:30:58.326ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274042025-03-07T23:30:58.327ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274052025-03-07T23:30:58.331ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
274062025-03-07T23:30:58.331ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
274072025-03-07T23:30:58.331ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
274082025-03-07T23:30:58.331ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
274092025-03-07T23:30:58.333ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
274102025-03-07T23:30:58.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
274112025-03-07T23:30:58.338ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274122025-03-07T23:30:58.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274132025-03-07T23:30:58.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274142025-03-07T23:30:58.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274152025-03-07T23:30:58.340ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274162025-03-07T23:30:58.340ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274172025-03-07T23:30:58.341ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274182025-03-07T23:30:58.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274192025-03-07T23:30:58.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274202025-03-07T23:30:58.345ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274212025-03-07T23:30:58.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274222025-03-07T23:30:58.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274232025-03-07T23:30:58.348ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274242025-03-07T23:30:58.351ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 57772 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 589851ad-b6ac-4332-b1cb-8028c2ed07e3 response_code = 404 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274252025-03-07T23:30:58.352ZINFOtest_unauthorized (external client test context): client received response status = 404
274262025-03-07T23:30:58.352ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274272025-03-07T23:30:58.352ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274282025-03-07T23:30:58.352ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 526c832f-537b-4f8c-a33e-c8ee13a5f5cf uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274292025-03-07T23:30:58.352ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 526c832f-537b-4f8c-a33e-c8ee13a5f5cf uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274302025-03-07T23:30:58.353ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 526c832f-537b-4f8c-a33e-c8ee13a5f5cf uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274312025-03-07T23:30:58.353ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 526c832f-537b-4f8c-a33e-c8ee13a5f5cf uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274322025-03-07T23:30:58.353ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 605 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 526c832f-537b-4f8c-a33e-c8ee13a5f5cf response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274332025-03-07T23:30:58.353ZINFOtest_unauthorized (external client test context): client received response status = 401
274342025-03-07T23:30:58.353ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274352025-03-07T23:30:58.353ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274362025-03-07T23:30:58.353ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3566ee49-b9ff-43f4-98bb-1fb451e809cb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274372025-03-07T23:30:58.353ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3566ee49-b9ff-43f4-98bb-1fb451e809cb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274382025-03-07T23:30:58.353ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3566ee49-b9ff-43f4-98bb-1fb451e809cb uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274392025-03-07T23:30:58.353ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 215 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3566ee49-b9ff-43f4-98bb-1fb451e809cb response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274402025-03-07T23:30:58.354ZINFOtest_unauthorized (external client test context): client received response status = 401
274412025-03-07T23:30:58.354ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274422025-03-07T23:30:58.354ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274432025-03-07T23:30:58.354ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e7ee1c4-ed93-4665-914e-839bb9e73a2b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274442025-03-07T23:30:58.354ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e7ee1c4-ed93-4665-914e-839bb9e73a2b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274452025-03-07T23:30:58.357ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5901:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpAddress>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5915:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpAddress>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::InternetGatewaySelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InternetGatewayIpAddressCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::InternetGatewayIpAddress>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e7ee1c4-ed93-4665-914e-839bb9e73a2b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274462025-03-07T23:30:58.357ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1878 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e7ee1c4-ed93-4665-914e-839bb9e73a2b response_code = 401 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274472025-03-07T23:30:58.357ZINFOtest_unauthorized (external client test context): client received response status = 401
274482025-03-07T23:30:58.357ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274492025-03-07T23:30:58.357ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274502025-03-07T23:30:58.357ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8ae7aa03-d593-4d5e-acf4-44bcdb59ab68 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274512025-03-07T23:30:58.357ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8ae7aa03-d593-4d5e-acf4-44bcdb59ab68 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274522025-03-07T23:30:58.357ZINFOtest_unauthorized (external client test context): client received response status = 405
274532025-03-07T23:30:58.357ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274542025-03-07T23:30:58.357ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274552025-03-07T23:30:58.357ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 52abb40a-449e-48d3-8d4d-2f7d404e46d0 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274562025-03-07T23:30:58.357ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 52abb40a-449e-48d3-8d4d-2f7d404e46d0 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274572025-03-07T23:30:58.358ZINFOtest_unauthorized (external client test context): client received response status = 405
274582025-03-07T23:30:58.358ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274592025-03-07T23:30:58.358ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274602025-03-07T23:30:58.358ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1bb049cb-946a-486b-8611-0738a3ceabb6 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274612025-03-07T23:30:58.358ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1bb049cb-946a-486b-8611-0738a3ceabb6 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274622025-03-07T23:30:58.358ZINFOtest_unauthorized (external client test context): client received response status = 405
274632025-03-07T23:30:58.358ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274642025-03-07T23:30:58.358ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274652025-03-07T23:30:58.358ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f4de20e7-bc2f-4d3c-86bc-235c4fdf6ba5 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274662025-03-07T23:30:58.358ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f4de20e7-bc2f-4d3c-86bc-235c4fdf6ba5 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274672025-03-07T23:30:58.359ZINFOtest_unauthorized (external client test context): client received response status = 405
274682025-03-07T23:30:58.359ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274692025-03-07T23:30:58.359ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274702025-03-07T23:30:58.359ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8fd70f4f-6df1-49d2-b58e-123ca175bd92 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274712025-03-07T23:30:58.359ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8fd70f4f-6df1-49d2-b58e-123ca175bd92 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274722025-03-07T23:30:58.359ZINFOtest_unauthorized (external client test context): client received response status = 405
274732025-03-07T23:30:58.359ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274742025-03-07T23:30:58.359ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274752025-03-07T23:30:58.360ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d56cfcdd-6590-4d7b-81ec-36c6d3504d82 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274762025-03-07T23:30:58.360ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d56cfcdd-6590-4d7b-81ec-36c6d3504d82 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274772025-03-07T23:30:58.360ZINFOtest_unauthorized (external client test context): client received response status = 405
274782025-03-07T23:30:58.360ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274792025-03-07T23:30:58.360ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274802025-03-07T23:30:58.360ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 194c17b1-f1ad-445b-bd27-2d5addff2e4b uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274812025-03-07T23:30:58.360ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 194c17b1-f1ad-445b-bd27-2d5addff2e4b response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274822025-03-07T23:30:58.361ZINFOtest_unauthorized (external client test context): client received response status = 405
274832025-03-07T23:30:58.361ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274842025-03-07T23:30:58.361ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274852025-03-07T23:30:58.361ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 44269253-9169-41c7-a026-ea3fc4515755 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274862025-03-07T23:30:58.361ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 44269253-9169-41c7-a026-ea3fc4515755 response_code = 405 uri = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274872025-03-07T23:30:58.361ZINFOtest_unauthorized (external client test context): client received response status = 405
274882025-03-07T23:30:58.363ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-addresses?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274892025-03-07T23:30:58.363ZINFOtest_unauthorized: test: begin endpoint url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274902025-03-07T23:30:58.363ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274912025-03-07T23:30:58.363ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274922025-03-07T23:30:58.363ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274932025-03-07T23:30:58.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8b57aa7e-65ed-4045-b7a8-7b4e9831b884 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274942025-03-07T23:30:58.364ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8b57aa7e-65ed-4045-b7a8-7b4e9831b884 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274952025-03-07T23:30:58.364ZINFOtest_unauthorized (external client test context): client received response status = 405
274962025-03-07T23:30:58.364ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274972025-03-07T23:30:58.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274982025-03-07T23:30:58.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de561952-abc5-47a7-927e-3c0ea054a6e1 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
274992025-03-07T23:30:58.364ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de561952-abc5-47a7-927e-3c0ea054a6e1 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275002025-03-07T23:30:58.364ZINFOtest_unauthorized (external client test context): client received response status = 405
275012025-03-07T23:30:58.364ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275022025-03-07T23:30:58.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275032025-03-07T23:30:58.365ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f57faab-d6bb-4599-b842-76c2ebf2dcbe uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275042025-03-07T23:30:58.365ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0f57faab-d6bb-4599-b842-76c2ebf2dcbe response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275052025-03-07T23:30:58.365ZINFOtest_unauthorized (external client test context): client received response status = 405
275062025-03-07T23:30:58.365ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275072025-03-07T23:30:58.365ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275082025-03-07T23:30:58.365ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a01aa916-eec0-412b-ab5e-805df2fbe076 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275092025-03-07T23:30:58.365ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a01aa916-eec0-412b-ab5e-805df2fbe076 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275102025-03-07T23:30:58.366ZINFOtest_unauthorized (external client test context): client received response status = 405
275112025-03-07T23:30:58.366ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275122025-03-07T23:30:58.366ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275132025-03-07T23:30:58.366ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f4c87bed-5082-4124-8d41-9b4ffc2e850b uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275142025-03-07T23:30:58.366ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = f4c87bed-5082-4124-8d41-9b4ffc2e850b response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275152025-03-07T23:30:58.366ZINFOtest_unauthorized (external client test context): client received response status = 405
275162025-03-07T23:30:58.366ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275172025-03-07T23:30:58.366ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275182025-03-07T23:30:58.366ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 41092ea7-87e3-4819-97c1-218ff2f1bef0 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275192025-03-07T23:30:58.366ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 41092ea7-87e3-4819-97c1-218ff2f1bef0 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275202025-03-07T23:30:58.367ZINFOtest_unauthorized (external client test context): client received response status = 405
275212025-03-07T23:30:58.367ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275222025-03-07T23:30:58.367ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275232025-03-07T23:30:58.367ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c2b83956-2fcb-42cd-9338-69ae953289c0 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275242025-03-07T23:30:58.367ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c2b83956-2fcb-42cd-9338-69ae953289c0 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275252025-03-07T23:30:58.368ZINFOtest_unauthorized (external client test context): client received response status = 405
275262025-03-07T23:30:58.368ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275272025-03-07T23:30:58.368ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275282025-03-07T23:30:58.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5f93947a-302b-47b2-b8af-d34607e4dc93 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275292025-03-07T23:30:58.368ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5f93947a-302b-47b2-b8af-d34607e4dc93 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275302025-03-07T23:30:58.368ZINFOtest_unauthorized (external client test context): client received response status = 405
275312025-03-07T23:30:58.368ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275322025-03-07T23:30:58.368ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275332025-03-07T23:30:58.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b690394a-d2cb-4f84-ba07-8929c7b707c7 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275342025-03-07T23:30:58.369ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b690394a-d2cb-4f84-ba07-8929c7b707c7 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275352025-03-07T23:30:58.369ZINFOtest_unauthorized (external client test context): client received response status = 405
275362025-03-07T23:30:58.369ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275372025-03-07T23:30:58.369ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275382025-03-07T23:30:58.369ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e71d1ea2-5eb3-4f94-a078-31daf153298e uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275392025-03-07T23:30:58.370ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e71d1ea2-5eb3-4f94-a078-31daf153298e response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275402025-03-07T23:30:58.370ZINFOtest_unauthorized (external client test context): client received response status = 405
275412025-03-07T23:30:58.370ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275422025-03-07T23:30:58.370ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275432025-03-07T23:30:58.370ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 10dc70ec-e4a8-4c38-bd99-7e1bf3fe75ba uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275442025-03-07T23:30:58.370ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 10dc70ec-e4a8-4c38-bd99-7e1bf3fe75ba response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275452025-03-07T23:30:58.370ZINFOtest_unauthorized (external client test context): client received response status = 405
275462025-03-07T23:30:58.370ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275472025-03-07T23:30:58.370ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275482025-03-07T23:30:58.370ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c87899e8-14ef-43f4-bf2b-ccb6a88912c8 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275492025-03-07T23:30:58.370ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c87899e8-14ef-43f4-bf2b-ccb6a88912c8 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275502025-03-07T23:30:58.370ZINFOtest_unauthorized (external client test context): client received response status = 405
275512025-03-07T23:30:58.370ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275522025-03-07T23:30:58.370ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275532025-03-07T23:30:58.371ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275542025-03-07T23:30:58.371ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275552025-03-07T23:30:58.371ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275562025-03-07T23:30:58.371ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275572025-03-07T23:30:58.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275582025-03-07T23:30:58.372ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275592025-03-07T23:30:58.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275602025-03-07T23:30:58.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275612025-03-07T23:30:58.381ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275622025-03-07T23:30:58.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
275632025-03-07T23:30:58.389ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
275642025-03-07T23:30:58.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275652025-03-07T23:30:58.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275662025-03-07T23:30:58.390ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275672025-03-07T23:30:58.393ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
275682025-03-07T23:30:58.393ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275692025-03-07T23:30:58.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275702025-03-07T23:30:58.394ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275712025-03-07T23:30:58.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
275722025-03-07T23:30:58.400ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
275732025-03-07T23:30:58.400ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275742025-03-07T23:30:58.400ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275752025-03-07T23:30:58.401ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275762025-03-07T23:30:58.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
275772025-03-07T23:30:58.404ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
275782025-03-07T23:30:58.404ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275792025-03-07T23:30:58.404ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275802025-03-07T23:30:58.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275812025-03-07T23:30:58.408ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
275822025-03-07T23:30:58.408ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
275832025-03-07T23:30:58.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
275842025-03-07T23:30:58.409ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
275852025-03-07T23:30:58.412ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
275862025-03-07T23:30:58.416ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
275872025-03-07T23:30:58.416ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275882025-03-07T23:30:58.416ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275892025-03-07T23:30:58.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275902025-03-07T23:30:58.417ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275912025-03-07T23:30:58.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275922025-03-07T23:30:58.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275932025-03-07T23:30:58.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275942025-03-07T23:30:58.423ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275952025-03-07T23:30:58.423ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275962025-03-07T23:30:58.423ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275972025-03-07T23:30:58.425ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275982025-03-07T23:30:58.425ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e roles = RoleSet { roles: {} } uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
275992025-03-07T23:30:58.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e resource = Database result = Ok(()) uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276002025-03-07T23:30:58.429ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: internet-gateway with name "demo-internet-gateway" error_message_internal = not found: internet-gateway with name "demo-internet-gateway" latency_us = 58229 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9041c3f0-0753-4ae8-946d-e60b3657473e response_code = 404 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276012025-03-07T23:30:58.429ZINFOtest_unauthorized (external client test context): client received response status = 404
276022025-03-07T23:30:58.430ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276032025-03-07T23:30:58.430ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276042025-03-07T23:30:58.430ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a99ee65c-fbc9-4110-894b-d7ada6ec53a8 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276052025-03-07T23:30:58.430ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a99ee65c-fbc9-4110-894b-d7ada6ec53a8 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276062025-03-07T23:30:58.431ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a99ee65c-fbc9-4110-894b-d7ada6ec53a8 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276072025-03-07T23:30:58.431ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a99ee65c-fbc9-4110-894b-d7ada6ec53a8 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276082025-03-07T23:30:58.431ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 455 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a99ee65c-fbc9-4110-894b-d7ada6ec53a8 response_code = 401 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276092025-03-07T23:30:58.431ZINFOtest_unauthorized (external client test context): client received response status = 401
276102025-03-07T23:30:58.431ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276112025-03-07T23:30:58.431ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276122025-03-07T23:30:58.431ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 67f84a00-b862-4a6c-85a3-0adf1c899547 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276132025-03-07T23:30:58.432ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 67f84a00-b862-4a6c-85a3-0adf1c899547 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276142025-03-07T23:30:58.432ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 67f84a00-b862-4a6c-85a3-0adf1c899547 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276152025-03-07T23:30:58.432ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 795 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 67f84a00-b862-4a6c-85a3-0adf1c899547 response_code = 401 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276162025-03-07T23:30:58.433ZINFOtest_unauthorized (external client test context): client received response status = 401
276172025-03-07T23:30:58.433ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276182025-03-07T23:30:58.433ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276192025-03-07T23:30:58.433ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a529e154-68fd-460c-8d9d-47806c368326 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276202025-03-07T23:30:58.433ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a529e154-68fd-460c-8d9d-47806c368326 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276212025-03-07T23:30:58.436ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:5927:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:5952:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::internet_gateway_ip_address_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::IpAddressPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::DeleteInternetGatewayElementSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a529e154-68fd-460c-8d9d-47806c368326 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276222025-03-07T23:30:58.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1697 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a529e154-68fd-460c-8d9d-47806c368326 response_code = 401 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276232025-03-07T23:30:58.436ZINFOtest_unauthorized (external client test context): client received response status = 401
276242025-03-07T23:30:58.436ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276252025-03-07T23:30:58.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276262025-03-07T23:30:58.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c5784b6d-7598-41f4-b56c-157a9f22d3c1 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276272025-03-07T23:30:58.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c5784b6d-7598-41f4-b56c-157a9f22d3c1 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276282025-03-07T23:30:58.436ZINFOtest_unauthorized (external client test context): client received response status = 405
276292025-03-07T23:30:58.436ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276302025-03-07T23:30:58.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276312025-03-07T23:30:58.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2ec7d507-48c4-4f40-a220-bc8896da1b92 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276322025-03-07T23:30:58.436ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2ec7d507-48c4-4f40-a220-bc8896da1b92 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276332025-03-07T23:30:58.436ZINFOtest_unauthorized (external client test context): client received response status = 405
276342025-03-07T23:30:58.436ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276352025-03-07T23:30:58.436ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276362025-03-07T23:30:58.436ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6a09ab3d-ae91-4b52-8a84-700bc5bc35f8 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276372025-03-07T23:30:58.437ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6a09ab3d-ae91-4b52-8a84-700bc5bc35f8 response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276382025-03-07T23:30:58.437ZINFOtest_unauthorized (external client test context): client received response status = 405
276392025-03-07T23:30:58.437ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276402025-03-07T23:30:58.437ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276412025-03-07T23:30:58.437ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3a97b5a8-eae6-4e08-99eb-17ad6395f80f uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276422025-03-07T23:30:58.437ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3a97b5a8-eae6-4e08-99eb-17ad6395f80f response_code = 405 uri = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276432025-03-07T23:30:58.437ZINFOtest_unauthorized (external client test context): client received response status = 405
276442025-03-07T23:30:58.437ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/internet-gateway-ip-addresses/demo-igw-address?project=demo-project&vpc=demo-vpc&gateway=demo-internet-gateway
276452025-03-07T23:30:58.437ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks?project=demo-project
276462025-03-07T23:30:58.438ZINFOtest_unauthorized: test: privileged GET url = /v1/disks?project=demo-project
276472025-03-07T23:30:58.438ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks?project=demo-project
276482025-03-07T23:30:58.438ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d uri = /v1/disks?project=demo-project
276492025-03-07T23:30:58.438ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d uri = /v1/disks?project=demo-project
276502025-03-07T23:30:58.438ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
276512025-03-07T23:30:58.438ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276522025-03-07T23:30:58.438ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276532025-03-07T23:30:58.439ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276542025-03-07T23:30:58.441ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276552025-03-07T23:30:58.441ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276562025-03-07T23:30:58.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276572025-03-07T23:30:58.444ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
276582025-03-07T23:30:58.444ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
276592025-03-07T23:30:58.444ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276602025-03-07T23:30:58.444ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276612025-03-07T23:30:58.445ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276622025-03-07T23:30:58.449ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
276632025-03-07T23:30:58.449ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276642025-03-07T23:30:58.449ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276652025-03-07T23:30:58.450ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276662025-03-07T23:30:58.454ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
276672025-03-07T23:30:58.459ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
276682025-03-07T23:30:58.459ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276692025-03-07T23:30:58.459ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276702025-03-07T23:30:58.459ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276712025-03-07T23:30:58.465ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
276722025-03-07T23:30:58.466ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
276732025-03-07T23:30:58.466ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276742025-03-07T23:30:58.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276752025-03-07T23:30:58.467ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276762025-03-07T23:30:58.469ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
276772025-03-07T23:30:58.469ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
276782025-03-07T23:30:58.469ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
276792025-03-07T23:30:58.470ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
276802025-03-07T23:30:58.473ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
276812025-03-07T23:30:58.478ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
276822025-03-07T23:30:58.478ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d uri = /v1/disks?project=demo-project
276832025-03-07T23:30:58.478ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
276842025-03-07T23:30:58.478ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
276852025-03-07T23:30:58.480ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
276862025-03-07T23:30:58.485ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
276872025-03-07T23:30:58.485ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
276882025-03-07T23:30:58.485ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
276892025-03-07T23:30:58.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
276902025-03-07T23:30:58.487ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
276912025-03-07T23:30:58.487ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
276922025-03-07T23:30:58.487ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
276932025-03-07T23:30:58.488ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
276942025-03-07T23:30:58.504ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
276952025-03-07T23:30:58.504ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
276962025-03-07T23:30:58.504ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
276972025-03-07T23:30:58.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
276982025-03-07T23:30:58.508ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
276992025-03-07T23:30:58.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
277002025-03-07T23:30:58.508ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277012025-03-07T23:30:58.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277022025-03-07T23:30:58.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
277032025-03-07T23:30:58.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
277042025-03-07T23:30:58.523ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
277052025-03-07T23:30:58.523ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
277062025-03-07T23:30:58.524ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
277072025-03-07T23:30:58.524ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277082025-03-07T23:30:58.524ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277092025-03-07T23:30:58.528ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
277102025-03-07T23:30:58.528ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
277112025-03-07T23:30:58.528ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277122025-03-07T23:30:58.529ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277132025-03-07T23:30:58.533ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
277142025-03-07T23:30:58.533ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
277152025-03-07T23:30:58.533ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277162025-03-07T23:30:58.534ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277172025-03-07T23:30:58.537ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
277182025-03-07T23:30:58.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
277192025-03-07T23:30:58.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database uri = /v1/disks?project=demo-project
277202025-03-07T23:30:58.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277212025-03-07T23:30:58.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277222025-03-07T23:30:58.559ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 120909 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b46705a0-637f-4ca7-babd-6ad45d30501d response_code = 200 uri = /v1/disks?project=demo-project
277232025-03-07T23:30:58.560ZINFOtest_unauthorized (external client test context): client received response status = 200
277242025-03-07T23:30:58.560ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks?project=demo-project
277252025-03-07T23:30:58.560ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks?project=demo-project
277262025-03-07T23:30:58.561ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 uri = /v1/disks?project=demo-project
277272025-03-07T23:30:58.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
277282025-03-07T23:30:58.562ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 uri = /v1/disks?project=demo-project
277292025-03-07T23:30:58.562ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks?project=demo-project
277302025-03-07T23:30:58.562ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277312025-03-07T23:30:58.562ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277322025-03-07T23:30:58.563ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277332025-03-07T23:30:58.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
277342025-03-07T23:30:58.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
277352025-03-07T23:30:58.565ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
277362025-03-07T23:30:58.565ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
277372025-03-07T23:30:58.565ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
277382025-03-07T23:30:58.565ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277392025-03-07T23:30:58.565ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277402025-03-07T23:30:58.566ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277412025-03-07T23:30:58.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
277422025-03-07T23:30:58.568ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
277432025-03-07T23:30:58.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277442025-03-07T23:30:58.568ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277452025-03-07T23:30:58.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277462025-03-07T23:30:58.571ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
277472025-03-07T23:30:58.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277482025-03-07T23:30:58.571ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277492025-03-07T23:30:58.572ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277502025-03-07T23:30:58.574ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
277512025-03-07T23:30:58.579ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
277522025-03-07T23:30:58.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277532025-03-07T23:30:58.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277542025-03-07T23:30:58.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277552025-03-07T23:30:58.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
277562025-03-07T23:30:58.582ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
277572025-03-07T23:30:58.582ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277582025-03-07T23:30:58.582ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277592025-03-07T23:30:58.583ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277602025-03-07T23:30:58.585ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
277612025-03-07T23:30:58.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
277622025-03-07T23:30:58.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
277632025-03-07T23:30:58.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
277642025-03-07T23:30:58.588ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
277652025-03-07T23:30:58.597ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
277662025-03-07T23:30:58.597ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 uri = /v1/disks?project=demo-project
277672025-03-07T23:30:58.597ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database uri = /v1/disks?project=demo-project
277682025-03-07T23:30:58.597ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277692025-03-07T23:30:58.600ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277702025-03-07T23:30:58.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database uri = /v1/disks?project=demo-project
277712025-03-07T23:30:58.603ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277722025-03-07T23:30:58.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277732025-03-07T23:30:58.608ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
277742025-03-07T23:30:58.609ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
277752025-03-07T23:30:58.609ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database uri = /v1/disks?project=demo-project
277762025-03-07T23:30:58.609ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277772025-03-07T23:30:58.609ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277782025-03-07T23:30:58.617ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
277792025-03-07T23:30:58.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database uri = /v1/disks?project=demo-project
277802025-03-07T23:30:58.618ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277812025-03-07T23:30:58.629ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277822025-03-07T23:30:58.634ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
277832025-03-07T23:30:58.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database uri = /v1/disks?project=demo-project
277842025-03-07T23:30:58.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277852025-03-07T23:30:58.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
277862025-03-07T23:30:58.656ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
277872025-03-07T23:30:58.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/disks?project=demo-project
277882025-03-07T23:30:58.697ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 135885 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 48ef29e7-7ac0-4616-91c8-293010824914 response_code = 404 uri = /v1/disks?project=demo-project
277892025-03-07T23:30:58.699ZINFOtest_unauthorized (external client test context): client received response status = 404
277902025-03-07T23:30:58.699ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks?project=demo-project
277912025-03-07T23:30:58.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks?project=demo-project
277922025-03-07T23:30:58.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eb30ce16-278b-4f53-a2e9-079545ec7616 uri = /v1/disks?project=demo-project
277932025-03-07T23:30:58.704ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eb30ce16-278b-4f53-a2e9-079545ec7616 uri = /v1/disks?project=demo-project
277942025-03-07T23:30:58.705ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eb30ce16-278b-4f53-a2e9-079545ec7616 uri = /v1/disks?project=demo-project
277952025-03-07T23:30:58.705ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eb30ce16-278b-4f53-a2e9-079545ec7616 uri = /v1/disks?project=demo-project
277962025-03-07T23:30:58.705ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 5329 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = eb30ce16-278b-4f53-a2e9-079545ec7616 response_code = 401 uri = /v1/disks?project=demo-project
277972025-03-07T23:30:58.706ZINFOtest_unauthorized (external client test context): client received response status = 401
277982025-03-07T23:30:58.706ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks?project=demo-project
277992025-03-07T23:30:58.707ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278002025-03-07T23:30:58.707ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9f286b0e-01b1-4b89-a7be-13a5f65c02a1 uri = /v1/disks?project=demo-project
278012025-03-07T23:30:58.707ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9f286b0e-01b1-4b89-a7be-13a5f65c02a1 uri = /v1/disks?project=demo-project
278022025-03-07T23:30:58.707ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9f286b0e-01b1-4b89-a7be-13a5f65c02a1 uri = /v1/disks?project=demo-project
278032025-03-07T23:30:58.708ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 513 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9f286b0e-01b1-4b89-a7be-13a5f65c02a1 response_code = 401 uri = /v1/disks?project=demo-project
278042025-03-07T23:30:58.708ZINFOtest_unauthorized (external client test context): client received response status = 401
278052025-03-07T23:30:58.708ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks?project=demo-project
278062025-03-07T23:30:58.708ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278072025-03-07T23:30:58.709ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3276863-1da5-4f11-991c-224efc21e972 uri = /v1/disks?project=demo-project
278082025-03-07T23:30:58.709ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3276863-1da5-4f11-991c-224efc21e972 uri = /v1/disks?project=demo-project
278092025-03-07T23:30:58.711ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1755:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1779:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3276863-1da5-4f11-991c-224efc21e972 uri = /v1/disks?project=demo-project
278102025-03-07T23:30:58.711ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2642 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3276863-1da5-4f11-991c-224efc21e972 response_code = 401 uri = /v1/disks?project=demo-project
278112025-03-07T23:30:58.711ZINFOtest_unauthorized (external client test context): client received response status = 401
278122025-03-07T23:30:58.711ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks?project=demo-project
278132025-03-07T23:30:58.711ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278142025-03-07T23:30:58.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0872dcc0-7bd5-49a3-8b54-eb9b3fd39530 uri = /v1/disks?project=demo-project
278152025-03-07T23:30:58.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0872dcc0-7bd5-49a3-8b54-eb9b3fd39530 response_code = 405 uri = /v1/disks?project=demo-project
278162025-03-07T23:30:58.712ZINFOtest_unauthorized (external client test context): client received response status = 405
278172025-03-07T23:30:58.712ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks?project=demo-project
278182025-03-07T23:30:58.712ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278192025-03-07T23:30:58.712ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d146f799-9419-4fc0-b0e6-1bd7b8954207 uri = /v1/disks?project=demo-project
278202025-03-07T23:30:58.712ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d146f799-9419-4fc0-b0e6-1bd7b8954207 response_code = 405 uri = /v1/disks?project=demo-project
278212025-03-07T23:30:58.712ZINFOtest_unauthorized (external client test context): client received response status = 405
278222025-03-07T23:30:58.712ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks?project=demo-project
278232025-03-07T23:30:58.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278242025-03-07T23:30:58.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cac73149-0c63-434c-9cf5-bba583e07d46 uri = /v1/disks?project=demo-project
278252025-03-07T23:30:58.713ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cac73149-0c63-434c-9cf5-bba583e07d46 response_code = 405 uri = /v1/disks?project=demo-project
278262025-03-07T23:30:58.713ZINFOtest_unauthorized (external client test context): client received response status = 405
278272025-03-07T23:30:58.713ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks?project=demo-project
278282025-03-07T23:30:58.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278292025-03-07T23:30:58.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 74301e1e-ad23-4c1f-8e36-9b02fe403098 uri = /v1/disks?project=demo-project
278302025-03-07T23:30:58.713ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 74301e1e-ad23-4c1f-8e36-9b02fe403098 response_code = 405 uri = /v1/disks?project=demo-project
278312025-03-07T23:30:58.713ZINFOtest_unauthorized (external client test context): client received response status = 405
278322025-03-07T23:30:58.714ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks?project=demo-project
278332025-03-07T23:30:58.714ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278342025-03-07T23:30:58.714ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb uri = /v1/disks?project=demo-project
278352025-03-07T23:30:58.714ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb uri = /v1/disks?project=demo-project
278362025-03-07T23:30:58.714ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks?project=demo-project
278372025-03-07T23:30:58.714ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278382025-03-07T23:30:58.714ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278392025-03-07T23:30:58.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278402025-03-07T23:30:58.720ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278412025-03-07T23:30:58.720ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278422025-03-07T23:30:58.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278432025-03-07T23:30:58.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
278442025-03-07T23:30:58.744ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
278452025-03-07T23:30:58.744ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278462025-03-07T23:30:58.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278472025-03-07T23:30:58.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278482025-03-07T23:30:58.747ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
278492025-03-07T23:30:58.748ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278502025-03-07T23:30:58.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278512025-03-07T23:30:58.748ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278522025-03-07T23:30:58.755ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
278532025-03-07T23:30:58.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
278542025-03-07T23:30:58.761ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278552025-03-07T23:30:58.761ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278562025-03-07T23:30:58.761ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278572025-03-07T23:30:58.781ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
278582025-03-07T23:30:58.781ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
278592025-03-07T23:30:58.781ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278602025-03-07T23:30:58.781ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278612025-03-07T23:30:58.782ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278622025-03-07T23:30:58.795ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
278632025-03-07T23:30:58.795ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
278642025-03-07T23:30:58.795ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
278652025-03-07T23:30:58.796ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
278662025-03-07T23:30:58.833ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
278672025-03-07T23:30:58.837ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
278682025-03-07T23:30:58.837ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb uri = /v1/disks?project=demo-project
278692025-03-07T23:30:58.837ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database uri = /v1/disks?project=demo-project
278702025-03-07T23:30:58.838ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
278712025-03-07T23:30:58.838ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
278722025-03-07T23:30:58.881ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database uri = /v1/disks?project=demo-project
278732025-03-07T23:30:58.881ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
278742025-03-07T23:30:58.882ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
278752025-03-07T23:30:58.911ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
278762025-03-07T23:30:58.911ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
278772025-03-07T23:30:58.915ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database uri = /v1/disks?project=demo-project
278782025-03-07T23:30:58.915ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
278792025-03-07T23:30:58.916ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
278802025-03-07T23:30:58.923ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
278812025-03-07T23:30:58.923ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
278822025-03-07T23:30:58.923ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
278832025-03-07T23:30:58.923ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
278842025-03-07T23:30:58.923ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
278852025-03-07T23:30:58.923ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database uri = /v1/disks?project=demo-project
278862025-03-07T23:30:58.923ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
278872025-03-07T23:30:58.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
278882025-03-07T23:30:58.942ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
278892025-03-07T23:30:58.942ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database uri = /v1/disks?project=demo-project
278902025-03-07T23:30:58.942ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
278912025-03-07T23:30:58.943ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
278922025-03-07T23:30:58.946ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
278932025-03-07T23:30:58.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/disks?project=demo-project
278942025-03-07T23:30:58.967ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 253385 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 908a99c0-dbe1-4f8a-8fb4-aaa6f4926dbb response_code = 404 uri = /v1/disks?project=demo-project
278952025-03-07T23:30:58.968ZINFOtest_unauthorized (external client test context): client received response status = 404
278962025-03-07T23:30:58.968ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks?project=demo-project
278972025-03-07T23:30:58.968ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks?project=demo-project
278982025-03-07T23:30:58.968ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bc656d14-a1bb-4e75-9cd8-785749e5d912 uri = /v1/disks?project=demo-project
278992025-03-07T23:30:58.968ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bc656d14-a1bb-4e75-9cd8-785749e5d912 uri = /v1/disks?project=demo-project
279002025-03-07T23:30:58.969ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bc656d14-a1bb-4e75-9cd8-785749e5d912 uri = /v1/disks?project=demo-project
279012025-03-07T23:30:58.969ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bc656d14-a1bb-4e75-9cd8-785749e5d912 uri = /v1/disks?project=demo-project
279022025-03-07T23:30:58.969ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 393 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bc656d14-a1bb-4e75-9cd8-785749e5d912 response_code = 401 uri = /v1/disks?project=demo-project
279032025-03-07T23:30:58.969ZINFOtest_unauthorized (external client test context): client received response status = 401
279042025-03-07T23:30:58.969ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks?project=demo-project
279052025-03-07T23:30:58.969ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279062025-03-07T23:30:58.969ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 896492d1-ccc5-48d6-a66d-08fcdc93fcdb uri = /v1/disks?project=demo-project
279072025-03-07T23:30:58.969ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 896492d1-ccc5-48d6-a66d-08fcdc93fcdb uri = /v1/disks?project=demo-project
279082025-03-07T23:30:58.969ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 896492d1-ccc5-48d6-a66d-08fcdc93fcdb uri = /v1/disks?project=demo-project
279092025-03-07T23:30:58.969ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 245 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 896492d1-ccc5-48d6-a66d-08fcdc93fcdb response_code = 401 uri = /v1/disks?project=demo-project
279102025-03-07T23:30:58.970ZINFOtest_unauthorized (external client test context): client received response status = 401
279112025-03-07T23:30:58.970ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks?project=demo-project
279122025-03-07T23:30:58.970ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279132025-03-07T23:30:58.970ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40a1439e-4f67-4e1e-a08c-eb0bc238adf7 uri = /v1/disks?project=demo-project
279142025-03-07T23:30:58.970ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40a1439e-4f67-4e1e-a08c-eb0bc238adf7 uri = /v1/disks?project=demo-project
279152025-03-07T23:30:58.987ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1791:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1805:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40a1439e-4f67-4e1e-a08c-eb0bc238adf7 uri = /v1/disks?project=demo-project
279162025-03-07T23:30:58.987ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 17261 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40a1439e-4f67-4e1e-a08c-eb0bc238adf7 response_code = 401 uri = /v1/disks?project=demo-project
279172025-03-07T23:30:58.988ZINFOtest_unauthorized (external client test context): client received response status = 401
279182025-03-07T23:30:58.988ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks?project=demo-project
279192025-03-07T23:30:58.988ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279202025-03-07T23:30:58.989ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a8911db8-1591-4dc0-888a-7995fb3103ae uri = /v1/disks?project=demo-project
279212025-03-07T23:30:58.990ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 790 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a8911db8-1591-4dc0-888a-7995fb3103ae response_code = 405 uri = /v1/disks?project=demo-project
279222025-03-07T23:30:58.991ZINFOtest_unauthorized (external client test context): client received response status = 405
279232025-03-07T23:30:58.991ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks?project=demo-project
279242025-03-07T23:30:58.991ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279252025-03-07T23:30:58.992ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7b7be8ce-7638-4422-9587-067a110addb4 uri = /v1/disks?project=demo-project
279262025-03-07T23:30:58.992ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7b7be8ce-7638-4422-9587-067a110addb4 response_code = 405 uri = /v1/disks?project=demo-project
279272025-03-07T23:30:58.992ZINFOtest_unauthorized (external client test context): client received response status = 405
279282025-03-07T23:30:58.993ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks?project=demo-project
279292025-03-07T23:30:58.993ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279302025-03-07T23:30:58.993ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 11b7e94f-389c-4a84-983c-380497db5ef4 uri = /v1/disks?project=demo-project
279312025-03-07T23:30:58.993ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 11b7e94f-389c-4a84-983c-380497db5ef4 response_code = 405 uri = /v1/disks?project=demo-project
279322025-03-07T23:30:58.994ZINFOtest_unauthorized (external client test context): client received response status = 405
279332025-03-07T23:30:58.994ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks?project=demo-project
279342025-03-07T23:30:58.994ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279352025-03-07T23:30:58.994ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 869175ff-316d-483d-8592-948c0dd799d7 uri = /v1/disks?project=demo-project
279362025-03-07T23:30:58.994ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 869175ff-316d-483d-8592-948c0dd799d7 response_code = 405 uri = /v1/disks?project=demo-project
279372025-03-07T23:30:58.995ZINFOtest_unauthorized (external client test context): client received response status = 405
279382025-03-07T23:30:58.995ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks?project=demo-project
279392025-03-07T23:30:58.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279402025-03-07T23:30:58.995ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dfd062f5-6982-4380-a730-e82deb5dee18 uri = /v1/disks?project=demo-project
279412025-03-07T23:30:58.995ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dfd062f5-6982-4380-a730-e82deb5dee18 response_code = 405 uri = /v1/disks?project=demo-project
279422025-03-07T23:30:58.995ZINFOtest_unauthorized (external client test context): client received response status = 405
279432025-03-07T23:30:58.995ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks?project=demo-project
279442025-03-07T23:30:58.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279452025-03-07T23:30:58.996ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e49341d8-37c6-4bf1-9450-b10aed2fa0eb uri = /v1/disks?project=demo-project
279462025-03-07T23:30:58.996ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 152 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e49341d8-37c6-4bf1-9450-b10aed2fa0eb response_code = 405 uri = /v1/disks?project=demo-project
279472025-03-07T23:30:58.996ZINFOtest_unauthorized (external client test context): client received response status = 405
279482025-03-07T23:30:58.996ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks?project=demo-project
279492025-03-07T23:30:58.996ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279502025-03-07T23:30:58.997ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7fd0101b-4563-45fe-a96f-1d17f326a6e9 uri = /v1/disks?project=demo-project
279512025-03-07T23:30:58.997ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 102 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7fd0101b-4563-45fe-a96f-1d17f326a6e9 response_code = 405 uri = /v1/disks?project=demo-project
279522025-03-07T23:30:58.998ZINFOtest_unauthorized (external client test context): client received response status = 405
279532025-03-07T23:30:58.998ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks?project=demo-project
279542025-03-07T23:30:58.998ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279552025-03-07T23:30:58.998ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 482d9063-0256-477b-93c3-ddf1773ad286 uri = /v1/disks?project=demo-project
279562025-03-07T23:30:58.998ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 482d9063-0256-477b-93c3-ddf1773ad286 response_code = 405 uri = /v1/disks?project=demo-project
279572025-03-07T23:30:58.998ZINFOtest_unauthorized (external client test context): client received response status = 405
279582025-03-07T23:30:58.998ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks?project=demo-project
279592025-03-07T23:30:58.998ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks?project=demo-project
279602025-03-07T23:30:58.998ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba uri = /v1/disks?project=demo-project
279612025-03-07T23:30:58.999ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba uri = /v1/disks?project=demo-project
279622025-03-07T23:30:58.999ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks?project=demo-project
279632025-03-07T23:30:58.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279642025-03-07T23:30:58.999ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279652025-03-07T23:30:58.999ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279662025-03-07T23:30:59.010ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279672025-03-07T23:30:59.010ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279682025-03-07T23:30:59.010ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279692025-03-07T23:30:59.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
279702025-03-07T23:30:59.012ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
279712025-03-07T23:30:59.012ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279722025-03-07T23:30:59.012ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279732025-03-07T23:30:59.013ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279742025-03-07T23:30:59.016ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
279752025-03-07T23:30:59.016ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279762025-03-07T23:30:59.016ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279772025-03-07T23:30:59.016ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279782025-03-07T23:30:59.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
279792025-03-07T23:30:59.023ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
279802025-03-07T23:30:59.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279812025-03-07T23:30:59.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279822025-03-07T23:30:59.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279832025-03-07T23:30:59.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
279842025-03-07T23:30:59.030ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
279852025-03-07T23:30:59.030ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279862025-03-07T23:30:59.031ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279872025-03-07T23:30:59.043ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279882025-03-07T23:30:59.049ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
279892025-03-07T23:30:59.050ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
279902025-03-07T23:30:59.050ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
279912025-03-07T23:30:59.063ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
279922025-03-07T23:30:59.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
279932025-03-07T23:30:59.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
279942025-03-07T23:30:59.063ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
279952025-03-07T23:30:59.065ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
279962025-03-07T23:30:59.070ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
279972025-03-07T23:30:59.070ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba uri = /v1/disks?project=demo-project
279982025-03-07T23:30:59.070ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
279992025-03-07T23:30:59.070ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280002025-03-07T23:30:59.070ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280012025-03-07T23:30:59.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280022025-03-07T23:30:59.074ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280032025-03-07T23:30:59.074ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280042025-03-07T23:30:59.085ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
280052025-03-07T23:30:59.085ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
280062025-03-07T23:30:59.085ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280072025-03-07T23:30:59.085ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280082025-03-07T23:30:59.086ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280092025-03-07T23:30:59.090ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
280102025-03-07T23:30:59.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280112025-03-07T23:30:59.090ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280122025-03-07T23:30:59.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280132025-03-07T23:30:59.094ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
280142025-03-07T23:30:59.094ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280152025-03-07T23:30:59.094ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280162025-03-07T23:30:59.095ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280172025-03-07T23:30:59.100ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
280182025-03-07T23:30:59.109ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
280192025-03-07T23:30:59.109ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/disks?project=demo-project
280202025-03-07T23:30:59.109ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks?project=demo-project
280212025-03-07T23:30:59.109ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280222025-03-07T23:30:59.110ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280232025-03-07T23:30:59.110ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280242025-03-07T23:30:59.119ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks?project=demo-project
280252025-03-07T23:30:59.119ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280262025-03-07T23:30:59.119ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280272025-03-07T23:30:59.120ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280282025-03-07T23:30:59.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks?project=demo-project
280292025-03-07T23:30:59.124ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280302025-03-07T23:30:59.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280312025-03-07T23:30:59.124ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280322025-03-07T23:30:59.128ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks?project=demo-project
280332025-03-07T23:30:59.135ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/disks?project=demo-project
280342025-03-07T23:30:59.136ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database uri = /v1/disks?project=demo-project
280352025-03-07T23:30:59.136ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba roles = RoleSet { roles: {} } uri = /v1/disks?project=demo-project
280362025-03-07T23:30:59.136ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba resource = Database result = Ok(()) uri = /v1/disks?project=demo-project
280372025-03-07T23:30:59.142ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 143380 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fde412c6-079d-474f-9090-890a97ebb8ba response_code = 200 uri = /v1/disks?project=demo-project
280382025-03-07T23:30:59.143ZINFOtest_unauthorized (external client test context): client received response status = 200
280392025-03-07T23:30:59.144ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-disk?project=demo-project
280402025-03-07T23:30:59.144ZINFOtest_unauthorized: test: privileged GET url = /v1/disks/demo-disk?project=demo-project
280412025-03-07T23:30:59.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
280422025-03-07T23:30:59.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c uri = /v1/disks/demo-disk?project=demo-project
280432025-03-07T23:30:59.145ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c uri = /v1/disks/demo-disk?project=demo-project
280442025-03-07T23:30:59.145ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk?project=demo-project
280452025-03-07T23:30:59.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280462025-03-07T23:30:59.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280472025-03-07T23:30:59.145ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280482025-03-07T23:30:59.146ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280492025-03-07T23:30:59.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280502025-03-07T23:30:59.147ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280512025-03-07T23:30:59.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
280522025-03-07T23:30:59.148ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
280532025-03-07T23:30:59.149ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280542025-03-07T23:30:59.149ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280552025-03-07T23:30:59.149ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280562025-03-07T23:30:59.151ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
280572025-03-07T23:30:59.151ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280582025-03-07T23:30:59.151ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280592025-03-07T23:30:59.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280602025-03-07T23:30:59.153ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
280612025-03-07T23:30:59.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
280622025-03-07T23:30:59.156ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280632025-03-07T23:30:59.156ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280642025-03-07T23:30:59.157ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280652025-03-07T23:30:59.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
280662025-03-07T23:30:59.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
280672025-03-07T23:30:59.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
280682025-03-07T23:30:59.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
280692025-03-07T23:30:59.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
280702025-03-07T23:30:59.160ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
280712025-03-07T23:30:59.160ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280722025-03-07T23:30:59.160ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280732025-03-07T23:30:59.160ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280742025-03-07T23:30:59.162ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
280752025-03-07T23:30:59.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
280762025-03-07T23:30:59.162ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
280772025-03-07T23:30:59.162ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
280782025-03-07T23:30:59.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
280792025-03-07T23:30:59.163ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
280802025-03-07T23:30:59.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
280812025-03-07T23:30:59.169ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
280822025-03-07T23:30:59.169ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c uri = /v1/disks/demo-disk?project=demo-project
280832025-03-07T23:30:59.169ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database uri = /v1/disks/demo-disk?project=demo-project
280842025-03-07T23:30:59.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
280852025-03-07T23:30:59.170ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
280862025-03-07T23:30:59.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
280872025-03-07T23:30:59.171ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
280882025-03-07T23:30:59.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database uri = /v1/disks/demo-disk?project=demo-project
280892025-03-07T23:30:59.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
280902025-03-07T23:30:59.174ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
280912025-03-07T23:30:59.177ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database uri = /v1/disks/demo-disk?project=demo-project
280922025-03-07T23:30:59.177ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
280932025-03-07T23:30:59.178ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
280942025-03-07T23:30:59.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
280952025-03-07T23:30:59.195ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
280962025-03-07T23:30:59.195ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database uri = /v1/disks/demo-disk?project=demo-project
280972025-03-07T23:30:59.195ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
280982025-03-07T23:30:59.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
280992025-03-07T23:30:59.203ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
281002025-03-07T23:30:59.212ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database uri = /v1/disks/demo-disk?project=demo-project
281012025-03-07T23:30:59.212ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281022025-03-07T23:30:59.212ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281032025-03-07T23:30:59.217ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
281042025-03-07T23:30:59.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database uri = /v1/disks/demo-disk?project=demo-project
281052025-03-07T23:30:59.217ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281062025-03-07T23:30:59.219ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281072025-03-07T23:30:59.245ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk?project=demo-project
281082025-03-07T23:30:59.255ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281092025-03-07T23:30:59.255ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 111915 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4b5cdd5f-f306-4c83-bea0-d9b898e7ce4c response_code = 200 uri = /v1/disks/demo-disk?project=demo-project
281102025-03-07T23:30:59.256ZINFOtest_unauthorized (external client test context): client received response status = 200
281112025-03-07T23:30:59.256ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-disk?project=demo-project
281122025-03-07T23:30:59.256ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
281132025-03-07T23:30:59.256ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 uri = /v1/disks/demo-disk?project=demo-project
281142025-03-07T23:30:59.256ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 uri = /v1/disks/demo-disk?project=demo-project
281152025-03-07T23:30:59.256ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-disk?project=demo-project
281162025-03-07T23:30:59.256ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281172025-03-07T23:30:59.256ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281182025-03-07T23:30:59.257ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281192025-03-07T23:30:59.259ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
281202025-03-07T23:30:59.263ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281212025-03-07T23:30:59.263ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281222025-03-07T23:30:59.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281232025-03-07T23:30:59.290ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
281242025-03-07T23:30:59.290ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
281252025-03-07T23:30:59.290ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281262025-03-07T23:30:59.290ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281272025-03-07T23:30:59.291ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281282025-03-07T23:30:59.293ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
281292025-03-07T23:30:59.293ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281302025-03-07T23:30:59.293ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281312025-03-07T23:30:59.294ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281322025-03-07T23:30:59.297ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
281332025-03-07T23:30:59.301ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
281342025-03-07T23:30:59.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281352025-03-07T23:30:59.304ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281362025-03-07T23:30:59.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281372025-03-07T23:30:59.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
281382025-03-07T23:30:59.325ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
281392025-03-07T23:30:59.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281402025-03-07T23:30:59.325ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281412025-03-07T23:30:59.327ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281422025-03-07T23:30:59.330ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
281432025-03-07T23:30:59.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
281442025-03-07T23:30:59.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
281452025-03-07T23:30:59.332ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
281462025-03-07T23:30:59.336ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
281472025-03-07T23:30:59.345ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
281482025-03-07T23:30:59.345ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 uri = /v1/disks/demo-disk?project=demo-project
281492025-03-07T23:30:59.345ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database uri = /v1/disks/demo-disk?project=demo-project
281502025-03-07T23:30:59.345ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281512025-03-07T23:30:59.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281522025-03-07T23:30:59.355ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database uri = /v1/disks/demo-disk?project=demo-project
281532025-03-07T23:30:59.355ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281542025-03-07T23:30:59.356ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281552025-03-07T23:30:59.395ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database uri = /v1/disks/demo-disk?project=demo-project
281562025-03-07T23:30:59.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281572025-03-07T23:30:59.396ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281582025-03-07T23:30:59.420ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
281592025-03-07T23:30:59.421ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
281602025-03-07T23:30:59.423ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1dbaa58b-c764-42a3-9726-422e51ec5c61 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
281612025-03-07T23:30:59.423ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1dbaa58b-c764-42a3-9726-422e51ec5c61 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
281622025-03-07T23:30:59.423ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1dbaa58b-c764-42a3-9726-422e51ec5c61 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
281632025-03-07T23:30:59.423ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1dbaa58b-c764-42a3-9726-422e51ec5c61 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
281642025-03-07T23:30:59.426ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
281652025-03-07T23:30:59.427ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
281662025-03-07T23:30:59.427ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database uri = /v1/disks/demo-disk?project=demo-project
281672025-03-07T23:30:59.427ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281682025-03-07T23:30:59.427ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281692025-03-07T23:30:59.430ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8654 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 1dbaa58b-c764-42a3-9726-422e51ec5c61 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
281702025-03-07T23:30:59.433ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "1dbaa58b-c764-42a3-9726-422e51ec5c61", "content-length": "405", "date": "Fri, 07 Mar 2025 23:30:58 GMT"} })
281712025-03-07T23:30:59.433ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
281722025-03-07T23:30:59.449ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
281732025-03-07T23:30:59.449ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database uri = /v1/disks/demo-disk?project=demo-project
281742025-03-07T23:30:59.449ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281752025-03-07T23:30:59.450ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281762025-03-07T23:30:59.451ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 87f07de0-0c85-479a-834e-62be6b2a1e4e uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
281772025-03-07T23:30:59.452ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 87f07de0-0c85-479a-834e-62be6b2a1e4e resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
281782025-03-07T23:30:59.452ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 87f07de0-0c85-479a-834e-62be6b2a1e4e roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
281792025-03-07T23:30:59.452ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 87f07de0-0c85-479a-834e-62be6b2a1e4e resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
281802025-03-07T23:30:59.460ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
281812025-03-07T23:30:59.460ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database uri = /v1/disks/demo-disk?project=demo-project
281822025-03-07T23:30:59.460ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281832025-03-07T23:30:59.461ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
281842025-03-07T23:30:59.463ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11475 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 87f07de0-0c85-479a-834e-62be6b2a1e4e response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
281852025-03-07T23:30:59.465ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
281862025-03-07T23:30:59.479ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-disk") }) uri = /v1/disks/demo-disk?project=demo-project
281872025-03-07T23:30:59.480ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-disk" error_message_internal = not found: disk with name "demo-disk" latency_us = 223474 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 393f8f5c-f6ac-4635-b06c-f6a351311652 response_code = 404 uri = /v1/disks/demo-disk?project=demo-project
281882025-03-07T23:30:59.480ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "87f07de0-0c85-479a-834e-62be6b2a1e4e", "content-length": "29", "date": "Fri, 07 Mar 2025 23:30:58 GMT"} })
281892025-03-07T23:30:59.480ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
281902025-03-07T23:30:59.480ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
281912025-03-07T23:30:59.480ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
281922025-03-07T23:30:59.480ZINFOtest_unauthorized (external client test context): client received response status = 404
281932025-03-07T23:30:59.481ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-disk?project=demo-project
281942025-03-07T23:30:59.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
281952025-03-07T23:30:59.481ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6324d51e-90b9-4583-8af6-4b69a40efe0c uri = /v1/disks/demo-disk?project=demo-project
281962025-03-07T23:30:59.481ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6324d51e-90b9-4583-8af6-4b69a40efe0c uri = /v1/disks/demo-disk?project=demo-project
281972025-03-07T23:30:59.481ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6324d51e-90b9-4583-8af6-4b69a40efe0c uri = /v1/disks/demo-disk?project=demo-project
281982025-03-07T23:30:59.481ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6324d51e-90b9-4583-8af6-4b69a40efe0c uri = /v1/disks/demo-disk?project=demo-project
281992025-03-07T23:30:59.481ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 331 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6324d51e-90b9-4583-8af6-4b69a40efe0c response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
282002025-03-07T23:30:59.481ZINFOtest_unauthorized (external client test context): client received response status = 401
282012025-03-07T23:30:59.481ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-disk?project=demo-project
282022025-03-07T23:30:59.481ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282032025-03-07T23:30:59.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 76d46a93-36ed-4ca0-80b3-8ba821e19a61 uri = /v1/disks/demo-disk?project=demo-project
282042025-03-07T23:30:59.482ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 76d46a93-36ed-4ca0-80b3-8ba821e19a61 uri = /v1/disks/demo-disk?project=demo-project
282052025-03-07T23:30:59.482ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 76d46a93-36ed-4ca0-80b3-8ba821e19a61 uri = /v1/disks/demo-disk?project=demo-project
282062025-03-07T23:30:59.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 284 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 76d46a93-36ed-4ca0-80b3-8ba821e19a61 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
282072025-03-07T23:30:59.482ZINFOtest_unauthorized (external client test context): client received response status = 401
282082025-03-07T23:30:59.482ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-disk?project=demo-project
282092025-03-07T23:30:59.482ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282102025-03-07T23:30:59.482ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18ae2f8b-9b2b-4ca6-aafc-7e23ce66c4cf uri = /v1/disks/demo-disk?project=demo-project
282112025-03-07T23:30:59.483ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18ae2f8b-9b2b-4ca6-aafc-7e23ce66c4cf uri = /v1/disks/demo-disk?project=demo-project
282122025-03-07T23:30:59.484ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1816:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1832:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18ae2f8b-9b2b-4ca6-aafc-7e23ce66c4cf uri = /v1/disks/demo-disk?project=demo-project
282132025-03-07T23:30:59.484ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1148 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 18ae2f8b-9b2b-4ca6-aafc-7e23ce66c4cf response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
282142025-03-07T23:30:59.484ZINFOtest_unauthorized (external client test context): client received response status = 401
282152025-03-07T23:30:59.484ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-disk?project=demo-project
282162025-03-07T23:30:59.484ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282172025-03-07T23:30:59.484ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b1a75c3a-888f-4a7a-b10b-0241025a16c6 uri = /v1/disks/demo-disk?project=demo-project
282182025-03-07T23:30:59.484ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b1a75c3a-888f-4a7a-b10b-0241025a16c6 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282192025-03-07T23:30:59.484ZINFOtest_unauthorized (external client test context): client received response status = 405
282202025-03-07T23:30:59.484ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-disk?project=demo-project
282212025-03-07T23:30:59.484ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282222025-03-07T23:30:59.485ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8e0549f6-7ba7-4d46-8e69-11a71bdf2121 uri = /v1/disks/demo-disk?project=demo-project
282232025-03-07T23:30:59.485ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8e0549f6-7ba7-4d46-8e69-11a71bdf2121 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282242025-03-07T23:30:59.485ZINFOtest_unauthorized (external client test context): client received response status = 405
282252025-03-07T23:30:59.485ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-disk?project=demo-project
282262025-03-07T23:30:59.485ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282272025-03-07T23:30:59.485ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0af85f49-e212-4daf-929d-fd2f07ed522c uri = /v1/disks/demo-disk?project=demo-project
282282025-03-07T23:30:59.485ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0af85f49-e212-4daf-929d-fd2f07ed522c response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282292025-03-07T23:30:59.485ZINFOtest_unauthorized (external client test context): client received response status = 405
282302025-03-07T23:30:59.486ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-disk?project=demo-project
282312025-03-07T23:30:59.486ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282322025-03-07T23:30:59.486ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 35d47368-641c-4895-9ce6-3a624f77de39 uri = /v1/disks/demo-disk?project=demo-project
282332025-03-07T23:30:59.486ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 35d47368-641c-4895-9ce6-3a624f77de39 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282342025-03-07T23:30:59.486ZINFOtest_unauthorized (external client test context): client received response status = 405
282352025-03-07T23:30:59.486ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-disk?project=demo-project
282362025-03-07T23:30:59.486ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282372025-03-07T23:30:59.486ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 03e39eed-41d6-4840-b56d-38c03c1dd846 uri = /v1/disks/demo-disk?project=demo-project
282382025-03-07T23:30:59.486ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 03e39eed-41d6-4840-b56d-38c03c1dd846 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282392025-03-07T23:30:59.487ZINFOtest_unauthorized (external client test context): client received response status = 405
282402025-03-07T23:30:59.487ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-disk?project=demo-project
282412025-03-07T23:30:59.487ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282422025-03-07T23:30:59.487ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d19e53ca-4b00-4535-9091-bc2bcf457350 uri = /v1/disks/demo-disk?project=demo-project
282432025-03-07T23:30:59.487ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d19e53ca-4b00-4535-9091-bc2bcf457350 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282442025-03-07T23:30:59.487ZINFOtest_unauthorized (external client test context): client received response status = 405
282452025-03-07T23:30:59.487ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-disk?project=demo-project
282462025-03-07T23:30:59.487ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282472025-03-07T23:30:59.487ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 46d06aaf-6a2a-4382-bc2e-12fab856b2b5 uri = /v1/disks/demo-disk?project=demo-project
282482025-03-07T23:30:59.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 46d06aaf-6a2a-4382-bc2e-12fab856b2b5 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282492025-03-07T23:30:59.488ZINFOtest_unauthorized (external client test context): client received response status = 405
282502025-03-07T23:30:59.488ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-disk?project=demo-project
282512025-03-07T23:30:59.488ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282522025-03-07T23:30:59.488ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7b857f3-5f29-43c2-9559-f62311189880 uri = /v1/disks/demo-disk?project=demo-project
282532025-03-07T23:30:59.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7b857f3-5f29-43c2-9559-f62311189880 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
282542025-03-07T23:30:59.488ZINFOtest_unauthorized (external client test context): client received response status = 405
282552025-03-07T23:30:59.488ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-disk?project=demo-project
282562025-03-07T23:30:59.488ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
282572025-03-07T23:30:59.489ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 uri = /v1/disks/demo-disk?project=demo-project
282582025-03-07T23:30:59.489ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 uri = /v1/disks/demo-disk?project=demo-project
282592025-03-07T23:30:59.489ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-disk?project=demo-project
282602025-03-07T23:30:59.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282612025-03-07T23:30:59.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282622025-03-07T23:30:59.489ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282632025-03-07T23:30:59.495ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282642025-03-07T23:30:59.495ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282652025-03-07T23:30:59.495ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282662025-03-07T23:30:59.508ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
282672025-03-07T23:30:59.508ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
282682025-03-07T23:30:59.508ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282692025-03-07T23:30:59.508ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282702025-03-07T23:30:59.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282712025-03-07T23:30:59.514ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
282722025-03-07T23:30:59.514ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282732025-03-07T23:30:59.514ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282742025-03-07T23:30:59.515ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282752025-03-07T23:30:59.517ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
282762025-03-07T23:30:59.521ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
282772025-03-07T23:30:59.522ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282782025-03-07T23:30:59.522ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282792025-03-07T23:30:59.522ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282802025-03-07T23:30:59.524ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
282812025-03-07T23:30:59.524ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
282822025-03-07T23:30:59.524ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282832025-03-07T23:30:59.525ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282842025-03-07T23:30:59.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282852025-03-07T23:30:59.527ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
282862025-03-07T23:30:59.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
282872025-03-07T23:30:59.527ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
282882025-03-07T23:30:59.528ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
282892025-03-07T23:30:59.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
282902025-03-07T23:30:59.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
282912025-03-07T23:30:59.533ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 uri = /v1/disks/demo-disk?project=demo-project
282922025-03-07T23:30:59.533ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database uri = /v1/disks/demo-disk?project=demo-project
282932025-03-07T23:30:59.534ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
282942025-03-07T23:30:59.534ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
282952025-03-07T23:30:59.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database uri = /v1/disks/demo-disk?project=demo-project
282962025-03-07T23:30:59.545ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
282972025-03-07T23:30:59.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
282982025-03-07T23:30:59.552ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database uri = /v1/disks/demo-disk?project=demo-project
282992025-03-07T23:30:59.552ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
283002025-03-07T23:30:59.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
283012025-03-07T23:30:59.555ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
283022025-03-07T23:30:59.556ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
283032025-03-07T23:30:59.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database uri = /v1/disks/demo-disk?project=demo-project
283042025-03-07T23:30:59.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
283052025-03-07T23:30:59.557ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
283062025-03-07T23:30:59.561ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
283072025-03-07T23:30:59.561ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database uri = /v1/disks/demo-disk?project=demo-project
283082025-03-07T23:30:59.561ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
283092025-03-07T23:30:59.562ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
283102025-03-07T23:30:59.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
283112025-03-07T23:30:59.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
283122025-03-07T23:30:59.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
283132025-03-07T23:30:59.565ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
283142025-03-07T23:30:59.566ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
283152025-03-07T23:30:59.566ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
283162025-03-07T23:30:59.566ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
283172025-03-07T23:30:59.566ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database uri = /v1/disks/demo-disk?project=demo-project
283182025-03-07T23:30:59.567ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
283192025-03-07T23:30:59.567ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
283202025-03-07T23:30:59.572ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
283212025-03-07T23:30:59.592ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-disk") }) uri = /v1/disks/demo-disk?project=demo-project
283222025-03-07T23:30:59.592ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-disk" error_message_internal = not found: disk with name "demo-disk" latency_us = 103722 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a9700df5-ff99-4d36-a0e7-c39453ce0585 response_code = 404 uri = /v1/disks/demo-disk?project=demo-project
283232025-03-07T23:30:59.593ZINFOtest_unauthorized (external client test context): client received response status = 404
283242025-03-07T23:30:59.593ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-disk?project=demo-project
283252025-03-07T23:30:59.593ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283262025-03-07T23:30:59.593ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76eba940-a36c-4098-ade7-121bf5d506e8 uri = /v1/disks/demo-disk?project=demo-project
283272025-03-07T23:30:59.593ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76eba940-a36c-4098-ade7-121bf5d506e8 uri = /v1/disks/demo-disk?project=demo-project
283282025-03-07T23:30:59.593ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76eba940-a36c-4098-ade7-121bf5d506e8 uri = /v1/disks/demo-disk?project=demo-project
283292025-03-07T23:30:59.593ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76eba940-a36c-4098-ade7-121bf5d506e8 uri = /v1/disks/demo-disk?project=demo-project
283302025-03-07T23:30:59.593ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 285 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 76eba940-a36c-4098-ade7-121bf5d506e8 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
283312025-03-07T23:30:59.593ZINFOtest_unauthorized (external client test context): client received response status = 401
283322025-03-07T23:30:59.594ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-disk?project=demo-project
283332025-03-07T23:30:59.594ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283342025-03-07T23:30:59.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6fab468a-e99e-4cd2-961d-a6f2f47a3c48 uri = /v1/disks/demo-disk?project=demo-project
283352025-03-07T23:30:59.594ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6fab468a-e99e-4cd2-961d-a6f2f47a3c48 uri = /v1/disks/demo-disk?project=demo-project
283362025-03-07T23:30:59.594ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6fab468a-e99e-4cd2-961d-a6f2f47a3c48 uri = /v1/disks/demo-disk?project=demo-project
283372025-03-07T23:30:59.594ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 176 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6fab468a-e99e-4cd2-961d-a6f2f47a3c48 response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
283382025-03-07T23:30:59.594ZINFOtest_unauthorized (external client test context): client received response status = 401
283392025-03-07T23:30:59.594ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-disk?project=demo-project
283402025-03-07T23:30:59.594ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283412025-03-07T23:30:59.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 940572d1-299e-47f6-98f4-dd9147ba88cf uri = /v1/disks/demo-disk?project=demo-project
283422025-03-07T23:30:59.594ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 940572d1-299e-47f6-98f4-dd9147ba88cf uri = /v1/disks/demo-disk?project=demo-project
283432025-03-07T23:30:59.596ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1843:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1859:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 940572d1-299e-47f6-98f4-dd9147ba88cf uri = /v1/disks/demo-disk?project=demo-project
283442025-03-07T23:30:59.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1101 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 940572d1-299e-47f6-98f4-dd9147ba88cf response_code = 401 uri = /v1/disks/demo-disk?project=demo-project
283452025-03-07T23:30:59.596ZINFOtest_unauthorized (external client test context): client received response status = 401
283462025-03-07T23:30:59.596ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-disk?project=demo-project
283472025-03-07T23:30:59.596ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283482025-03-07T23:30:59.596ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b7112401-ebc6-49b9-afb3-98ee19660656 uri = /v1/disks/demo-disk?project=demo-project
283492025-03-07T23:30:59.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b7112401-ebc6-49b9-afb3-98ee19660656 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
283502025-03-07T23:30:59.596ZINFOtest_unauthorized (external client test context): client received response status = 405
283512025-03-07T23:30:59.596ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-disk?project=demo-project
283522025-03-07T23:30:59.596ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283532025-03-07T23:30:59.596ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e7634243-e66b-40c3-9244-f0a10afa2f0d uri = /v1/disks/demo-disk?project=demo-project
283542025-03-07T23:30:59.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e7634243-e66b-40c3-9244-f0a10afa2f0d response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
283552025-03-07T23:30:59.596ZINFOtest_unauthorized (external client test context): client received response status = 405
283562025-03-07T23:30:59.597ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-disk?project=demo-project
283572025-03-07T23:30:59.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283582025-03-07T23:30:59.597ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 03026b46-1e64-4e96-a75d-84a34e067c22 uri = /v1/disks/demo-disk?project=demo-project
283592025-03-07T23:30:59.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 03026b46-1e64-4e96-a75d-84a34e067c22 response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
283602025-03-07T23:30:59.597ZINFOtest_unauthorized (external client test context): client received response status = 405
283612025-03-07T23:30:59.597ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-disk?project=demo-project
283622025-03-07T23:30:59.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283632025-03-07T23:30:59.597ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 44cdbccc-5c23-4faf-b8d6-c3229c00445a uri = /v1/disks/demo-disk?project=demo-project
283642025-03-07T23:30:59.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 44cdbccc-5c23-4faf-b8d6-c3229c00445a response_code = 405 uri = /v1/disks/demo-disk?project=demo-project
283652025-03-07T23:30:59.597ZINFOtest_unauthorized (external client test context): client received response status = 405
283662025-03-07T23:30:59.598ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-disk?project=demo-project
283672025-03-07T23:30:59.598ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk?project=demo-project
283682025-03-07T23:30:59.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 uri = /v1/disks/demo-disk?project=demo-project
283692025-03-07T23:30:59.598ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 uri = /v1/disks/demo-disk?project=demo-project
283702025-03-07T23:30:59.598ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk?project=demo-project
283712025-03-07T23:30:59.598ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283722025-03-07T23:30:59.598ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283732025-03-07T23:30:59.599ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283742025-03-07T23:30:59.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283752025-03-07T23:30:59.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283762025-03-07T23:30:59.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283772025-03-07T23:30:59.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
283782025-03-07T23:30:59.604ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
283792025-03-07T23:30:59.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283802025-03-07T23:30:59.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283812025-03-07T23:30:59.605ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283822025-03-07T23:30:59.609ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
283832025-03-07T23:30:59.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283842025-03-07T23:30:59.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283852025-03-07T23:30:59.610ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283862025-03-07T23:30:59.613ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
283872025-03-07T23:30:59.622ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
283882025-03-07T23:30:59.622ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283892025-03-07T23:30:59.622ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283902025-03-07T23:30:59.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283912025-03-07T23:30:59.625ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
283922025-03-07T23:30:59.625ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
283932025-03-07T23:30:59.626ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283942025-03-07T23:30:59.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283952025-03-07T23:30:59.626ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
283962025-03-07T23:30:59.628ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
283972025-03-07T23:30:59.628ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
283982025-03-07T23:30:59.628ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
283992025-03-07T23:30:59.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284002025-03-07T23:30:59.631ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
284012025-03-07T23:30:59.635ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
284022025-03-07T23:30:59.635ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 uri = /v1/disks/demo-disk?project=demo-project
284032025-03-07T23:30:59.635ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database uri = /v1/disks/demo-disk?project=demo-project
284042025-03-07T23:30:59.635ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
284052025-03-07T23:30:59.635ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284062025-03-07T23:30:59.638ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database uri = /v1/disks/demo-disk?project=demo-project
284072025-03-07T23:30:59.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
284082025-03-07T23:30:59.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284092025-03-07T23:30:59.640ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database uri = /v1/disks/demo-disk?project=demo-project
284102025-03-07T23:30:59.640ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
284112025-03-07T23:30:59.641ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284122025-03-07T23:30:59.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk?project=demo-project
284132025-03-07T23:30:59.643ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk?project=demo-project
284142025-03-07T23:30:59.643ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database uri = /v1/disks/demo-disk?project=demo-project
284152025-03-07T23:30:59.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
284162025-03-07T23:30:59.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284172025-03-07T23:30:59.647ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk?project=demo-project
284182025-03-07T23:30:59.647ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database uri = /v1/disks/demo-disk?project=demo-project
284192025-03-07T23:30:59.647ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
284202025-03-07T23:30:59.648ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284212025-03-07T23:30:59.651ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk?project=demo-project
284222025-03-07T23:30:59.651ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database uri = /v1/disks/demo-disk?project=demo-project
284232025-03-07T23:30:59.651ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk?project=demo-project
284242025-03-07T23:30:59.652ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Database result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284252025-03-07T23:30:59.656ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk?project=demo-project
284262025-03-07T23:30:59.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk?project=demo-project
284272025-03-07T23:30:59.665ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 67302 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2566e7c5-4fdb-4300-9234-7b6268594801 response_code = 200 uri = /v1/disks/demo-disk?project=demo-project
284282025-03-07T23:30:59.666ZINFOtest_unauthorized (external client test context): client received response status = 200
284292025-03-07T23:30:59.666ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284302025-03-07T23:30:59.666ZINFOtest_unauthorized: test: privileged GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284312025-03-07T23:30:59.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284322025-03-07T23:30:59.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284332025-03-07T23:30:59.666ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284342025-03-07T23:30:59.666ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284352025-03-07T23:30:59.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284362025-03-07T23:30:59.666ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284372025-03-07T23:30:59.667ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284382025-03-07T23:30:59.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284392025-03-07T23:30:59.672ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284402025-03-07T23:30:59.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284412025-03-07T23:30:59.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
284422025-03-07T23:30:59.676ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
284432025-03-07T23:30:59.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284442025-03-07T23:30:59.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284452025-03-07T23:30:59.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284462025-03-07T23:30:59.678ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
284472025-03-07T23:30:59.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284482025-03-07T23:30:59.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284492025-03-07T23:30:59.679ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284502025-03-07T23:30:59.694ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
284512025-03-07T23:30:59.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
284522025-03-07T23:30:59.699ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284532025-03-07T23:30:59.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284542025-03-07T23:30:59.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284552025-03-07T23:30:59.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
284562025-03-07T23:30:59.704ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
284572025-03-07T23:30:59.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284582025-03-07T23:30:59.704ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284592025-03-07T23:30:59.705ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284602025-03-07T23:30:59.707ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
284612025-03-07T23:30:59.707ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
284622025-03-07T23:30:59.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
284632025-03-07T23:30:59.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
284642025-03-07T23:30:59.710ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
284652025-03-07T23:30:59.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
284662025-03-07T23:30:59.713ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284672025-03-07T23:30:59.713ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284682025-03-07T23:30:59.713ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284692025-03-07T23:30:59.714ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284702025-03-07T23:30:59.716ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284712025-03-07T23:30:59.716ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284722025-03-07T23:30:59.717ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284732025-03-07T23:30:59.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284742025-03-07T23:30:59.718ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284752025-03-07T23:30:59.719ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284762025-03-07T23:30:59.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284772025-03-07T23:30:59.721ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284782025-03-07T23:30:59.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284792025-03-07T23:30:59.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284802025-03-07T23:30:59.722ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284812025-03-07T23:30:59.725ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284822025-03-07T23:30:59.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284832025-03-07T23:30:59.725ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284842025-03-07T23:30:59.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284852025-03-07T23:30:59.729ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284862025-03-07T23:30:59.729ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284872025-03-07T23:30:59.729ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284882025-03-07T23:30:59.729ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284892025-03-07T23:30:59.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284902025-03-07T23:30:59.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284912025-03-07T23:30:59.742ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database id = 005a5517-1b48-42a5-bbde-75a915de81f0
284922025-03-07T23:30:59.743ZTRACtest_unauthorized (clickhouse-client): executing SQL query id = 005a5517-1b48-42a5-bbde-75a915de81f0 sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
284932025-03-07T23:30:59.754ZTRACtest_unauthorized (clickhouse-client): retrieved new timeseries schema id = 005a5517-1b48-42a5-bbde-75a915de81f0 n_schema = 6
284942025-03-07T23:30:59.758ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 92003 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80caa14f-1fb4-4177-b0b6-1f07166cc645 response_code = 200 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284952025-03-07T23:30:59.765ZINFOtest_unauthorized (external client test context): client received response status = 200
284962025-03-07T23:30:59.765ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284972025-03-07T23:30:59.765ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284982025-03-07T23:30:59.766ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
284992025-03-07T23:30:59.770ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285002025-03-07T23:30:59.770ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285012025-03-07T23:30:59.770ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285022025-03-07T23:30:59.770ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285032025-03-07T23:30:59.771ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285042025-03-07T23:30:59.782ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285052025-03-07T23:30:59.782ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285062025-03-07T23:30:59.783ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285072025-03-07T23:30:59.805ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
285082025-03-07T23:30:59.806ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
285092025-03-07T23:30:59.806ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285102025-03-07T23:30:59.806ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285112025-03-07T23:30:59.808ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285122025-03-07T23:30:59.814ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
285132025-03-07T23:30:59.814ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285142025-03-07T23:30:59.815ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285152025-03-07T23:30:59.815ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285162025-03-07T23:30:59.825ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
285172025-03-07T23:30:59.829ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
285182025-03-07T23:30:59.829ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285192025-03-07T23:30:59.830ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285202025-03-07T23:30:59.830ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285212025-03-07T23:30:59.838ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
285222025-03-07T23:30:59.838ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
285232025-03-07T23:30:59.838ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285242025-03-07T23:30:59.838ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285252025-03-07T23:30:59.839ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285262025-03-07T23:30:59.876ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
285272025-03-07T23:30:59.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
285282025-03-07T23:30:59.876ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
285292025-03-07T23:30:59.877ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
285302025-03-07T23:30:59.894ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
285312025-03-07T23:30:59.898ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
285322025-03-07T23:30:59.898ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285332025-03-07T23:30:59.898ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285342025-03-07T23:30:59.898ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285352025-03-07T23:30:59.898ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285362025-03-07T23:30:59.939ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285372025-03-07T23:30:59.939ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285382025-03-07T23:30:59.939ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285392025-03-07T23:30:59.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285402025-03-07T23:30:59.952ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285412025-03-07T23:30:59.952ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285422025-03-07T23:30:59.967ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285432025-03-07T23:30:59.967ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285442025-03-07T23:30:59.967ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285452025-03-07T23:30:59.967ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285462025-03-07T23:30:59.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285472025-03-07T23:31:00.003ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285482025-03-07T23:31:00.003ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285492025-03-07T23:31:00.003ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285502025-03-07T23:31:00.003ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285512025-03-07T23:31:00.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285522025-03-07T23:31:00.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285532025-03-07T23:31:00.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285542025-03-07T23:31:00.013ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285552025-03-07T23:31:00.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285562025-03-07T23:31:00.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-disk") }) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285572025-03-07T23:31:00.047ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-disk" error_message_internal = not found: disk with name "demo-disk" latency_us = 281820 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c437ea56-58fc-43e0-a886-9e8c8ec97640 response_code = 404 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285582025-03-07T23:31:00.048ZINFOtest_unauthorized (external client test context): client received response status = 404
285592025-03-07T23:31:00.048ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285602025-03-07T23:31:00.048ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285612025-03-07T23:31:00.048ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de691318-16b0-48ee-bddc-b593e0800b28 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285622025-03-07T23:31:00.049ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de691318-16b0-48ee-bddc-b593e0800b28 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285632025-03-07T23:31:00.049ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de691318-16b0-48ee-bddc-b593e0800b28 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285642025-03-07T23:31:00.049ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de691318-16b0-48ee-bddc-b593e0800b28 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285652025-03-07T23:31:00.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 472 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = de691318-16b0-48ee-bddc-b593e0800b28 response_code = 401 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285662025-03-07T23:31:00.049ZINFOtest_unauthorized (external client test context): client received response status = 401
285672025-03-07T23:31:00.049ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285682025-03-07T23:31:00.049ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285692025-03-07T23:31:00.049ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5520c222-0fb7-4271-99fb-b7536784c3b5 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285702025-03-07T23:31:00.050ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5520c222-0fb7-4271-99fb-b7536784c3b5 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285712025-03-07T23:31:00.052ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5520c222-0fb7-4271-99fb-b7536784c3b5 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285722025-03-07T23:31:00.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 272 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5520c222-0fb7-4271-99fb-b7536784c3b5 response_code = 401 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285732025-03-07T23:31:00.058ZINFOtest_unauthorized (external client test context): client received response status = 401
285742025-03-07T23:31:00.058ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285752025-03-07T23:31:00.059ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285762025-03-07T23:31:00.059ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c5c9f874-d02d-4c43-8f43-26001f55c087 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285772025-03-07T23:31:00.059ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c5c9f874-d02d-4c43-8f43-26001f55c087 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285782025-03-07T23:31:00.063ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1884:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<oximeter_types::types::Measurement>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1905:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<oximeter_types::types::Measurement>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_metrics_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskMetricsPath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<nexus_types::external_api::params::ResourceMetrics, nexus_types::external_api::params::ResourceMetrics>>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<oximeter_types::types::Measurement>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c5c9f874-d02d-4c43-8f43-26001f55c087 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285792025-03-07T23:31:00.063ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3495 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c5c9f874-d02d-4c43-8f43-26001f55c087 response_code = 401 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285802025-03-07T23:31:00.063ZINFOtest_unauthorized (external client test context): client received response status = 401
285812025-03-07T23:31:00.063ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285822025-03-07T23:31:00.063ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285832025-03-07T23:31:00.063ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8d2373d7-8b90-4d77-941d-f9f2cb6333f6 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285842025-03-07T23:31:00.063ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8d2373d7-8b90-4d77-941d-f9f2cb6333f6 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285852025-03-07T23:31:00.063ZINFOtest_unauthorized (external client test context): client received response status = 405
285862025-03-07T23:31:00.063ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285872025-03-07T23:31:00.063ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285882025-03-07T23:31:00.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 08be65e4-4d4f-47bf-8dbb-62dbeaa34b53 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285892025-03-07T23:31:00.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 08be65e4-4d4f-47bf-8dbb-62dbeaa34b53 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285902025-03-07T23:31:00.064ZINFOtest_unauthorized (external client test context): client received response status = 405
285912025-03-07T23:31:00.064ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285922025-03-07T23:31:00.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285932025-03-07T23:31:00.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e0331afa-a295-4f22-9bbb-e7cf13b2c1e9 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285942025-03-07T23:31:00.064ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e0331afa-a295-4f22-9bbb-e7cf13b2c1e9 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285952025-03-07T23:31:00.064ZINFOtest_unauthorized (external client test context): client received response status = 405
285962025-03-07T23:31:00.064ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285972025-03-07T23:31:00.064ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285982025-03-07T23:31:00.064ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 097e2b95-8b0d-4008-b869-a581890f4f70 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
285992025-03-07T23:31:00.065ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 097e2b95-8b0d-4008-b869-a581890f4f70 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286002025-03-07T23:31:00.065ZINFOtest_unauthorized (external client test context): client received response status = 405
286012025-03-07T23:31:00.065ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286022025-03-07T23:31:00.065ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286032025-03-07T23:31:00.065ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dbf7472-ac62-4966-8ef9-0ad8783681a9 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286042025-03-07T23:31:00.065ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dbf7472-ac62-4966-8ef9-0ad8783681a9 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286052025-03-07T23:31:00.066ZINFOtest_unauthorized (external client test context): client received response status = 405
286062025-03-07T23:31:00.066ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286072025-03-07T23:31:00.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286082025-03-07T23:31:00.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b2a8ce44-5d30-4cc8-bd1c-1f9a0bb4376b uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286092025-03-07T23:31:00.066ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 146 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b2a8ce44-5d30-4cc8-bd1c-1f9a0bb4376b response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286102025-03-07T23:31:00.067ZINFOtest_unauthorized (external client test context): client received response status = 405
286112025-03-07T23:31:00.067ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286122025-03-07T23:31:00.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286132025-03-07T23:31:00.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6652a1c1-6d27-46fa-a28c-a17b334afbb6 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286142025-03-07T23:31:00.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 189 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6652a1c1-6d27-46fa-a28c-a17b334afbb6 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286152025-03-07T23:31:00.068ZINFOtest_unauthorized (external client test context): client received response status = 405
286162025-03-07T23:31:00.068ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286172025-03-07T23:31:00.068ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286182025-03-07T23:31:00.068ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a51a3708-d16b-4a39-80d4-008b65f54e59 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286192025-03-07T23:31:00.068ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a51a3708-d16b-4a39-80d4-008b65f54e59 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286202025-03-07T23:31:00.068ZINFOtest_unauthorized (external client test context): client received response status = 405
286212025-03-07T23:31:00.068ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286222025-03-07T23:31:00.068ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286232025-03-07T23:31:00.068ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c83e95b1-f18b-47fd-93fb-8b0248caf9cc uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286242025-03-07T23:31:00.069ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c83e95b1-f18b-47fd-93fb-8b0248caf9cc response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286252025-03-07T23:31:00.069ZINFOtest_unauthorized (external client test context): client received response status = 405
286262025-03-07T23:31:00.069ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286272025-03-07T23:31:00.069ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286282025-03-07T23:31:00.069ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1a68394b-ba9e-4837-874a-66e63215ce71 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286292025-03-07T23:31:00.072ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 2560 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1a68394b-ba9e-4837-874a-66e63215ce71 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286302025-03-07T23:31:00.097ZINFOtest_unauthorized (external client test context): client received response status = 405
286312025-03-07T23:31:00.098ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286322025-03-07T23:31:00.098ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286332025-03-07T23:31:00.111ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bb46e6e1-e39b-42df-8821-15eb1177791e uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286342025-03-07T23:31:00.112ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 442 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bb46e6e1-e39b-42df-8821-15eb1177791e response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286352025-03-07T23:31:00.137ZINFOtest_unauthorized (external client test context): client received response status = 405
286362025-03-07T23:31:00.138ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286372025-03-07T23:31:00.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286382025-03-07T23:31:00.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = da9bde75-b219-45a8-9c1a-e796295c289a uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286392025-03-07T23:31:00.144ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 233 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = da9bde75-b219-45a8-9c1a-e796295c289a response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286402025-03-07T23:31:00.144ZINFOtest_unauthorized (external client test context): client received response status = 405
286412025-03-07T23:31:00.144ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286422025-03-07T23:31:00.144ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286432025-03-07T23:31:00.144ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 39c3eeec-a9de-443f-a4a7-e69438c71c14 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286442025-03-07T23:31:00.144ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 39c3eeec-a9de-443f-a4a7-e69438c71c14 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286452025-03-07T23:31:00.144ZINFOtest_unauthorized (external client test context): client received response status = 405
286462025-03-07T23:31:00.144ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286472025-03-07T23:31:00.144ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286482025-03-07T23:31:00.144ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4be38df5-19ad-4adb-b007-a15aef2aa2df uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286492025-03-07T23:31:00.144ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4be38df5-19ad-4adb-b007-a15aef2aa2df response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286502025-03-07T23:31:00.144ZINFOtest_unauthorized (external client test context): client received response status = 405
286512025-03-07T23:31:00.144ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286522025-03-07T23:31:00.144ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286532025-03-07T23:31:00.144ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dab37ab5-fa82-46a3-b47a-bf95dadc729a uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286542025-03-07T23:31:00.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dab37ab5-fa82-46a3-b47a-bf95dadc729a response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286552025-03-07T23:31:00.145ZINFOtest_unauthorized (external client test context): client received response status = 405
286562025-03-07T23:31:00.145ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286572025-03-07T23:31:00.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286582025-03-07T23:31:00.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 84cdfe9b-4566-48e2-b85a-eb5391ce2d96 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286592025-03-07T23:31:00.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 84cdfe9b-4566-48e2-b85a-eb5391ce2d96 response_code = 405 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286602025-03-07T23:31:00.145ZINFOtest_unauthorized (external client test context): client received response status = 405
286612025-03-07T23:31:00.145ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286622025-03-07T23:31:00.145ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286632025-03-07T23:31:00.145ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286642025-03-07T23:31:00.145ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286652025-03-07T23:31:00.145ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
286662025-03-07T23:31:00.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286672025-03-07T23:31:00.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286682025-03-07T23:31:00.145ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286692025-03-07T23:31:00.168ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
286702025-03-07T23:31:00.169ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
286712025-03-07T23:31:00.169ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
286722025-03-07T23:31:00.169ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
286732025-03-07T23:31:00.169ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286742025-03-07T23:31:00.169ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286752025-03-07T23:31:00.169ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286762025-03-07T23:31:00.169ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
286772025-03-07T23:31:00.170ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
286782025-03-07T23:31:00.174ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
286792025-03-07T23:31:00.175ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
286802025-03-07T23:31:00.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286812025-03-07T23:31:00.175ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286822025-03-07T23:31:00.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286832025-03-07T23:31:00.177ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
286842025-03-07T23:31:00.177ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
286852025-03-07T23:31:00.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
286862025-03-07T23:31:00.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286872025-03-07T23:31:00.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286882025-03-07T23:31:00.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286892025-03-07T23:31:00.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
286902025-03-07T23:31:00.208ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
286912025-03-07T23:31:00.208ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286922025-03-07T23:31:00.208ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286932025-03-07T23:31:00.209ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286942025-03-07T23:31:00.211ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
286952025-03-07T23:31:00.212ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
286962025-03-07T23:31:00.212ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
286972025-03-07T23:31:00.212ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
286982025-03-07T23:31:00.214ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
286992025-03-07T23:31:00.216ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
287002025-03-07T23:31:00.216ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287012025-03-07T23:31:00.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287022025-03-07T23:31:00.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287032025-03-07T23:31:00.219ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
287042025-03-07T23:31:00.231ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
287052025-03-07T23:31:00.231ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287062025-03-07T23:31:00.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287072025-03-07T23:31:00.231ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287082025-03-07T23:31:00.231ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287092025-03-07T23:31:00.247ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287102025-03-07T23:31:00.247ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287112025-03-07T23:31:00.247ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287122025-03-07T23:31:00.249ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287132025-03-07T23:31:00.249ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287142025-03-07T23:31:00.250ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287152025-03-07T23:31:00.272ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
287162025-03-07T23:31:00.272ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287172025-03-07T23:31:00.272ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287182025-03-07T23:31:00.273ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287192025-03-07T23:31:00.273ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287202025-03-07T23:31:00.274ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287212025-03-07T23:31:00.287ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287222025-03-07T23:31:00.287ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287232025-03-07T23:31:00.287ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287242025-03-07T23:31:00.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287252025-03-07T23:31:00.297ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287262025-03-07T23:31:00.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287272025-03-07T23:31:00.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287282025-03-07T23:31:00.297ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Database result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287292025-03-07T23:31:00.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287302025-03-07T23:31:00.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 73275cd2-2539-4bad-bf9b-1c88b1e0aa34, lookup_type: ByName("demo-disk") } result = Ok(()) uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287312025-03-07T23:31:00.322ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database id = 005a5517-1b48-42a5-bbde-75a915de81f0
287322025-03-07T23:31:00.322ZTRACtest_unauthorized (clickhouse-client): executing SQL query id = 005a5517-1b48-42a5-bbde-75a915de81f0 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric', 'virtual_machine:check') FORMAT Native;
287332025-03-07T23:31:00.331ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database id = 005a5517-1b48-42a5-bbde-75a915de81f0
287342025-03-07T23:31:00.331ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 189258 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9c31bf4a-cc17-4c58-9050-c3986650d7d8 response_code = 200 uri = /v1/disks/demo-disk/metrics/activated?start_time=2025-03-07T23:30:31.255080721Z&end_time=2025-03-07T23:30:31.255081961Z&project=demo-project
287352025-03-07T23:31:00.331ZINFOtest_unauthorized (external client test context): client received response status = 200
287362025-03-07T23:31:00.332ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/disks?project=demo-project
287372025-03-07T23:31:00.332ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance/disks?project=demo-project
287382025-03-07T23:31:00.332ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
287392025-03-07T23:31:00.332ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 uri = /v1/instances/demo-instance/disks?project=demo-project
287402025-03-07T23:31:00.332ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 uri = /v1/instances/demo-instance/disks?project=demo-project
287412025-03-07T23:31:00.332ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/disks?project=demo-project
287422025-03-07T23:31:00.332ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287432025-03-07T23:31:00.332ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287442025-03-07T23:31:00.334ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287452025-03-07T23:31:00.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287462025-03-07T23:31:00.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287472025-03-07T23:31:00.344ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287482025-03-07T23:31:00.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
287492025-03-07T23:31:00.344ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
287502025-03-07T23:31:00.344ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287512025-03-07T23:31:00.344ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287522025-03-07T23:31:00.375ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287532025-03-07T23:31:00.395ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
287542025-03-07T23:31:00.395ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287552025-03-07T23:31:00.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287562025-03-07T23:31:00.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287572025-03-07T23:31:00.399ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
287582025-03-07T23:31:00.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
287592025-03-07T23:31:00.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287602025-03-07T23:31:00.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287612025-03-07T23:31:00.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287622025-03-07T23:31:00.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
287632025-03-07T23:31:00.407ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
287642025-03-07T23:31:00.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287652025-03-07T23:31:00.407ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287662025-03-07T23:31:00.408ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287672025-03-07T23:31:00.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
287682025-03-07T23:31:00.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
287692025-03-07T23:31:00.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
287702025-03-07T23:31:00.415ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
287712025-03-07T23:31:00.417ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
287722025-03-07T23:31:00.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
287732025-03-07T23:31:00.422ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 uri = /v1/instances/demo-instance/disks?project=demo-project
287742025-03-07T23:31:00.422ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
287752025-03-07T23:31:00.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
287762025-03-07T23:31:00.425ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287772025-03-07T23:31:00.438ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
287782025-03-07T23:31:00.438ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
287792025-03-07T23:31:00.439ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287802025-03-07T23:31:00.446ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
287812025-03-07T23:31:00.450ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
287822025-03-07T23:31:00.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287832025-03-07T23:31:00.473ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
287842025-03-07T23:31:00.474ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
287852025-03-07T23:31:00.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
287862025-03-07T23:31:00.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
287872025-03-07T23:31:00.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287882025-03-07T23:31:00.481ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
287892025-03-07T23:31:00.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
287902025-03-07T23:31:00.482ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
287912025-03-07T23:31:00.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287922025-03-07T23:31:00.506ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
287932025-03-07T23:31:00.506ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
287942025-03-07T23:31:00.506ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
287952025-03-07T23:31:00.507ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287962025-03-07T23:31:00.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
287972025-03-07T23:31:00.530ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
287982025-03-07T23:31:00.531ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
287992025-03-07T23:31:00.531ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
288002025-03-07T23:31:00.532ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288012025-03-07T23:31:00.532ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288022025-03-07T23:31:00.532ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288032025-03-07T23:31:00.543ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
288042025-03-07T23:31:00.544ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288052025-03-07T23:31:00.544ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288062025-03-07T23:31:00.545ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288072025-03-07T23:31:00.582ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
288082025-03-07T23:31:00.582ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
288092025-03-07T23:31:00.582ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288102025-03-07T23:31:00.583ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288112025-03-07T23:31:00.584ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288122025-03-07T23:31:00.584ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
288132025-03-07T23:31:00.586ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
288142025-03-07T23:31:00.588ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
288152025-03-07T23:31:00.588ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
288162025-03-07T23:31:00.588ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
288172025-03-07T23:31:00.588ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
288182025-03-07T23:31:00.611ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288192025-03-07T23:31:00.611ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288202025-03-07T23:31:00.611ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288212025-03-07T23:31:00.612ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288222025-03-07T23:31:00.624ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 292287 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3bab4b8a-c760-4cd6-9de6-08e7efc19354 response_code = 200 uri = /v1/instances/demo-instance/disks?project=demo-project
288232025-03-07T23:31:00.625ZINFOtest_unauthorized (external client test context): client received response status = 200
288242025-03-07T23:31:00.625ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/disks?project=demo-project
288252025-03-07T23:31:00.625ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
288262025-03-07T23:31:00.625ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 uri = /v1/instances/demo-instance/disks?project=demo-project
288272025-03-07T23:31:00.626ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 uri = /v1/instances/demo-instance/disks?project=demo-project
288282025-03-07T23:31:00.626ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/disks?project=demo-project
288292025-03-07T23:31:00.626ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288302025-03-07T23:31:00.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288312025-03-07T23:31:00.627ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288322025-03-07T23:31:00.638ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288332025-03-07T23:31:00.638ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288342025-03-07T23:31:00.639ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288352025-03-07T23:31:00.641ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
288362025-03-07T23:31:00.641ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
288372025-03-07T23:31:00.641ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288382025-03-07T23:31:00.641ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288392025-03-07T23:31:00.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288402025-03-07T23:31:00.644ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
288412025-03-07T23:31:00.644ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288422025-03-07T23:31:00.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288432025-03-07T23:31:00.645ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288442025-03-07T23:31:00.654ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
288452025-03-07T23:31:00.657ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
288462025-03-07T23:31:00.658ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288472025-03-07T23:31:00.658ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288482025-03-07T23:31:00.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288492025-03-07T23:31:00.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
288502025-03-07T23:31:00.662ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
288512025-03-07T23:31:00.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288522025-03-07T23:31:00.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288532025-03-07T23:31:00.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288542025-03-07T23:31:00.665ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
288552025-03-07T23:31:00.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
288562025-03-07T23:31:00.666ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
288572025-03-07T23:31:00.666ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
288582025-03-07T23:31:00.670ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
288592025-03-07T23:31:00.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
288602025-03-07T23:31:00.675ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 uri = /v1/instances/demo-instance/disks?project=demo-project
288612025-03-07T23:31:00.675ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288622025-03-07T23:31:00.675ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288632025-03-07T23:31:00.676ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288642025-03-07T23:31:00.681ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288652025-03-07T23:31:00.699ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288662025-03-07T23:31:00.701ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288672025-03-07T23:31:00.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288682025-03-07T23:31:00.735ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288692025-03-07T23:31:00.737ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288702025-03-07T23:31:00.742ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
288712025-03-07T23:31:00.742ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
288722025-03-07T23:31:00.742ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288732025-03-07T23:31:00.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288742025-03-07T23:31:00.742ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288752025-03-07T23:31:00.750ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
288762025-03-07T23:31:00.750ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288772025-03-07T23:31:00.750ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288782025-03-07T23:31:00.751ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288792025-03-07T23:31:00.769ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
288802025-03-07T23:31:00.769ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
288812025-03-07T23:31:00.769ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288822025-03-07T23:31:00.770ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
288832025-03-07T23:31:00.794ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
288842025-03-07T23:31:00.827ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/disks?project=demo-project
288852025-03-07T23:31:00.827ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 202083 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d5f49129-d758-4585-9576-ebb50d3f5182 response_code = 404 uri = /v1/instances/demo-instance/disks?project=demo-project
288862025-03-07T23:31:00.830ZINFOtest_unauthorized (external client test context): client received response status = 404
288872025-03-07T23:31:00.830ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/disks?project=demo-project
288882025-03-07T23:31:00.830ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
288892025-03-07T23:31:00.844ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8fe9613-e2ae-4579-8b9f-c3cf5a25749f uri = /v1/instances/demo-instance/disks?project=demo-project
288902025-03-07T23:31:00.845ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8fe9613-e2ae-4579-8b9f-c3cf5a25749f uri = /v1/instances/demo-instance/disks?project=demo-project
288912025-03-07T23:31:00.845ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8fe9613-e2ae-4579-8b9f-c3cf5a25749f uri = /v1/instances/demo-instance/disks?project=demo-project
288922025-03-07T23:31:00.845ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8fe9613-e2ae-4579-8b9f-c3cf5a25749f uri = /v1/instances/demo-instance/disks?project=demo-project
288932025-03-07T23:31:00.845ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 710 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8fe9613-e2ae-4579-8b9f-c3cf5a25749f response_code = 401 uri = /v1/instances/demo-instance/disks?project=demo-project
288942025-03-07T23:31:00.853ZINFOtest_unauthorized (external client test context): client received response status = 401
288952025-03-07T23:31:00.853ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/disks?project=demo-project
288962025-03-07T23:31:00.853ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
288972025-03-07T23:31:00.854ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3b039610-089f-4616-bcdb-342cf2507b0e uri = /v1/instances/demo-instance/disks?project=demo-project
288982025-03-07T23:31:00.862ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3b039610-089f-4616-bcdb-342cf2507b0e uri = /v1/instances/demo-instance/disks?project=demo-project
288992025-03-07T23:31:00.862ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3b039610-089f-4616-bcdb-342cf2507b0e uri = /v1/instances/demo-instance/disks?project=demo-project
289002025-03-07T23:31:00.862ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 8519 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3b039610-089f-4616-bcdb-342cf2507b0e response_code = 401 uri = /v1/instances/demo-instance/disks?project=demo-project
289012025-03-07T23:31:00.863ZINFOtest_unauthorized (external client test context): client received response status = 401
289022025-03-07T23:31:00.863ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/disks?project=demo-project
289032025-03-07T23:31:00.863ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289042025-03-07T23:31:00.869ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7e3c7b1f-ec85-4e3e-9ed9-7c9aedbfd247 uri = /v1/instances/demo-instance/disks?project=demo-project
289052025-03-07T23:31:00.869ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7e3c7b1f-ec85-4e3e-9ed9-7c9aedbfd247 uri = /v1/instances/demo-instance/disks?project=demo-project
289062025-03-07T23:31:00.871ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2421:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2444:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Disk>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7e3c7b1f-ec85-4e3e-9ed9-7c9aedbfd247 uri = /v1/instances/demo-instance/disks?project=demo-project
289072025-03-07T23:31:00.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1219 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7e3c7b1f-ec85-4e3e-9ed9-7c9aedbfd247 response_code = 401 uri = /v1/instances/demo-instance/disks?project=demo-project
289082025-03-07T23:31:00.871ZINFOtest_unauthorized (external client test context): client received response status = 401
289092025-03-07T23:31:00.871ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
289102025-03-07T23:31:00.871ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289112025-03-07T23:31:00.871ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2959aecb-3764-4085-9a1d-3470b1be597e uri = /v1/instances/demo-instance/disks?project=demo-project
289122025-03-07T23:31:00.871ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2959aecb-3764-4085-9a1d-3470b1be597e response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289132025-03-07T23:31:00.872ZINFOtest_unauthorized (external client test context): client received response status = 405
289142025-03-07T23:31:00.872ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
289152025-03-07T23:31:00.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289162025-03-07T23:31:00.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 95e0ca59-ccf7-484e-9b30-98308bafa99c uri = /v1/instances/demo-instance/disks?project=demo-project
289172025-03-07T23:31:00.872ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 95e0ca59-ccf7-484e-9b30-98308bafa99c response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289182025-03-07T23:31:00.872ZINFOtest_unauthorized (external client test context): client received response status = 405
289192025-03-07T23:31:00.872ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
289202025-03-07T23:31:00.872ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289212025-03-07T23:31:00.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9599b491-3e2e-4172-a933-9e161ad21499 uri = /v1/instances/demo-instance/disks?project=demo-project
289222025-03-07T23:31:00.873ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9599b491-3e2e-4172-a933-9e161ad21499 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289232025-03-07T23:31:00.873ZINFOtest_unauthorized (external client test context): client received response status = 405
289242025-03-07T23:31:00.873ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/disks?project=demo-project
289252025-03-07T23:31:00.873ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289262025-03-07T23:31:00.873ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50d45537-6ce4-4cf9-915e-ae4eb1f68d21 uri = /v1/instances/demo-instance/disks?project=demo-project
289272025-03-07T23:31:00.873ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 104 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50d45537-6ce4-4cf9-915e-ae4eb1f68d21 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289282025-03-07T23:31:00.873ZINFOtest_unauthorized (external client test context): client received response status = 405
289292025-03-07T23:31:00.873ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/disks?project=demo-project
289302025-03-07T23:31:00.873ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289312025-03-07T23:31:00.874ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5625b278-dd4c-4e2c-a1e5-ee2249bf8301 uri = /v1/instances/demo-instance/disks?project=demo-project
289322025-03-07T23:31:00.874ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5625b278-dd4c-4e2c-a1e5-ee2249bf8301 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289332025-03-07T23:31:00.874ZINFOtest_unauthorized (external client test context): client received response status = 405
289342025-03-07T23:31:00.874ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/disks?project=demo-project
289352025-03-07T23:31:00.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289362025-03-07T23:31:00.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a96fcd3e-0b08-40b5-8df9-b79c3aefa0c9 uri = /v1/instances/demo-instance/disks?project=demo-project
289372025-03-07T23:31:00.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a96fcd3e-0b08-40b5-8df9-b79c3aefa0c9 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289382025-03-07T23:31:00.875ZTRACtest_unauthorized (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: ff f2 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:54737 req_id = 5e14aa28-894d-45c2-9479-1037b933b3e1
289392025-03-07T23:31:00.875ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 65522,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54737 req_id = 5e14aa28-894d-45c2-9479-1037b933b3e1
289402025-03-07T23:31:00.875ZDEBGtest_unauthorized (store): query key key = _crucible-pantry._tcp
289412025-03-07T23:31:00.876ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
289422025-03-07T23:31:00.876ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:54737 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37181, target: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal") })) }] req_id = 5e14aa28-894d-45c2-9479-1037b933b3e1
289432025-03-07T23:31:00.876ZINFOtest_unauthorized (external client test context): client received response status = 405
289442025-03-07T23:31:00.876ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/disks?project=demo-project
289452025-03-07T23:31:00.876ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289462025-03-07T23:31:00.877ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 521822ea-51a1-4e2d-9e5d-323b8f5d50dc uri = /v1/instances/demo-instance/disks?project=demo-project
289472025-03-07T23:31:00.877ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 521822ea-51a1-4e2d-9e5d-323b8f5d50dc response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289482025-03-07T23:31:00.877ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: ad c4 01 00 00 01 00 00 00 00 00 01 24 39 37 30 ............$970\n0010: 66 64 62 39 31 2d 63 35 30 65 2d 34 33 37 37 2d fdb91-c50e-4377-\n0020: 38 35 37 34 2d 33 36 66 61 65 37 62 33 65 34 65 8574-36fae7b3e4e\n0030: 37 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 7.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:62195 req_id = 0c43fad1-bfb3-4702-b5a4-2871d78938ab
289492025-03-07T23:31:00.877ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 44484,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 57,\n 55,\n 48,\n 102,\n 100,\n 98,\n 57,\n 49,\n 45,\n 99,\n 53,\n 48,\n 101,\n 45,\n 52,\n 51,\n 55,\n 55,\n 45,\n 56,\n 53,\n 55,\n 52,\n 45,\n 51,\n 54,\n 102,\n 97,\n 101,\n 55,\n 98,\n 51,\n 101,\n 52,\n 101,\n 55,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62195 req_id = 0c43fad1-bfb3-4702-b5a4-2871d78938ab
289502025-03-07T23:31:00.877ZDEBGtest_unauthorized (store): query key key = 970fdb91-c50e-4377-8574-36fae7b3e4e7.host
289512025-03-07T23:31:00.877ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62195 query = LowerQuery { name: LowerName(Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal.")), original: Query { name: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("970fdb91-c50e-4377-8574-36fae7b3e4e7.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 0c43fad1-bfb3-4702-b5a4-2871d78938ab
289522025-03-07T23:31:00.878ZINFOtest_unauthorized (external client test context): client received response status = 405
289532025-03-07T23:31:00.878ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/disks?project=demo-project
289542025-03-07T23:31:00.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289552025-03-07T23:31:00.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 045e5ecf-f515-454f-9dcf-2934c4c4047a uri = /v1/instances/demo-instance/disks?project=demo-project
289562025-03-07T23:31:00.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 045e5ecf-f515-454f-9dcf-2934c4c4047a response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289572025-03-07T23:31:00.880ZINFOtest_unauthorized (external client test context): client received response status = 405
289582025-03-07T23:31:00.880ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
289592025-03-07T23:31:00.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289602025-03-07T23:31:00.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c039a462-03a6-4024-84a2-bbb5d6cd8656 uri = /v1/instances/demo-instance/disks?project=demo-project
289612025-03-07T23:31:00.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c039a462-03a6-4024-84a2-bbb5d6cd8656 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289622025-03-07T23:31:00.881ZINFOtest_unauthorized (external client test context): client received response status = 405
289632025-03-07T23:31:00.881ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
289642025-03-07T23:31:00.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289652025-03-07T23:31:00.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3c43ff18-569c-4812-bbf1-904741acac01 uri = /v1/instances/demo-instance/disks?project=demo-project
289662025-03-07T23:31:00.881ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3c43ff18-569c-4812-bbf1-904741acac01 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289672025-03-07T23:31:00.881ZINFOtest_unauthorized (external client test context): client received response status = 405
289682025-03-07T23:31:00.881ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
289692025-03-07T23:31:00.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289702025-03-07T23:31:00.882ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1274e61d-e342-4e8e-8d18-baebf6ef3f06 uri = /v1/instances/demo-instance/disks?project=demo-project
289712025-03-07T23:31:00.882ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1274e61d-e342-4e8e-8d18-baebf6ef3f06 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289722025-03-07T23:31:00.882ZINFOtest_unauthorized (external client test context): client received response status = 405
289732025-03-07T23:31:00.882ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/disks?project=demo-project
289742025-03-07T23:31:00.882ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289752025-03-07T23:31:00.882ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = effb2308-0be7-47be-950b-582af9f8d303 uri = /v1/instances/demo-instance/disks?project=demo-project
289762025-03-07T23:31:00.882ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = effb2308-0be7-47be-950b-582af9f8d303 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289772025-03-07T23:31:00.882ZINFOtest_unauthorized (external client test context): client received response status = 405
289782025-03-07T23:31:00.882ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
289792025-03-07T23:31:00.882ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289802025-03-07T23:31:00.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 92eaa72e-a5ef-43fa-8287-b44303bbf13a uri = /v1/instances/demo-instance/disks?project=demo-project
289812025-03-07T23:31:00.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 92eaa72e-a5ef-43fa-8287-b44303bbf13a response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289822025-03-07T23:31:00.883ZINFOtest_unauthorized (external client test context): client received response status = 405
289832025-03-07T23:31:00.883ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
289842025-03-07T23:31:00.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289852025-03-07T23:31:00.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a7d17bb6-caec-47e3-805a-f22d19c1c25f uri = /v1/instances/demo-instance/disks?project=demo-project
289862025-03-07T23:31:00.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a7d17bb6-caec-47e3-805a-f22d19c1c25f response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289872025-03-07T23:31:00.883ZINFOtest_unauthorized (external client test context): client received response status = 405
289882025-03-07T23:31:00.883ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
289892025-03-07T23:31:00.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289902025-03-07T23:31:00.884ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9774ad95-29b6-454e-9b9e-5e3d2fc09055 uri = /v1/instances/demo-instance/disks?project=demo-project
289912025-03-07T23:31:00.884ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9774ad95-29b6-454e-9b9e-5e3d2fc09055 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289922025-03-07T23:31:00.884ZINFOtest_unauthorized (external client test context): client received response status = 405
289932025-03-07T23:31:00.884ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/disks?project=demo-project
289942025-03-07T23:31:00.884ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
289952025-03-07T23:31:00.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6ac677ce-1027-4492-b48d-bb00702e0263 uri = /v1/instances/demo-instance/disks?project=demo-project
289962025-03-07T23:31:00.885ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 108 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6ac677ce-1027-4492-b48d-bb00702e0263 response_code = 405 uri = /v1/instances/demo-instance/disks?project=demo-project
289972025-03-07T23:31:00.885ZINFOtest_unauthorized (external client test context): client received response status = 405
289982025-03-07T23:31:00.885ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/disks?project=demo-project
289992025-03-07T23:31:00.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks?project=demo-project
290002025-03-07T23:31:00.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d uri = /v1/instances/demo-instance/disks?project=demo-project
290012025-03-07T23:31:00.885ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d uri = /v1/instances/demo-instance/disks?project=demo-project
290022025-03-07T23:31:00.886ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/disks?project=demo-project
290032025-03-07T23:31:00.886ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290042025-03-07T23:31:00.886ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290052025-03-07T23:31:00.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290062025-03-07T23:31:00.896ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290072025-03-07T23:31:00.896ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290082025-03-07T23:31:00.897ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290092025-03-07T23:31:00.900ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
290102025-03-07T23:31:00.900ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
290112025-03-07T23:31:00.900ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290122025-03-07T23:31:00.900ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290132025-03-07T23:31:00.901ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290142025-03-07T23:31:00.905ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
290152025-03-07T23:31:00.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290162025-03-07T23:31:00.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290172025-03-07T23:31:00.905ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290182025-03-07T23:31:00.908ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
290192025-03-07T23:31:00.911ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
290202025-03-07T23:31:00.911ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290212025-03-07T23:31:00.912ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290222025-03-07T23:31:00.912ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290232025-03-07T23:31:00.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
290242025-03-07T23:31:00.915ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
290252025-03-07T23:31:00.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290262025-03-07T23:31:00.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290272025-03-07T23:31:00.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290282025-03-07T23:31:00.918ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
290292025-03-07T23:31:00.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
290302025-03-07T23:31:00.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
290312025-03-07T23:31:00.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
290322025-03-07T23:31:00.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
290332025-03-07T23:31:00.926ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
290342025-03-07T23:31:00.926ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d uri = /v1/instances/demo-instance/disks?project=demo-project
290352025-03-07T23:31:00.926ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290362025-03-07T23:31:00.926ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290372025-03-07T23:31:00.927ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290382025-03-07T23:31:00.928ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
290392025-03-07T23:31:00.929ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
290402025-03-07T23:31:00.933ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290412025-03-07T23:31:00.933ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290422025-03-07T23:31:00.934ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290432025-03-07T23:31:00.950ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290442025-03-07T23:31:00.955ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290452025-03-07T23:31:00.956ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290462025-03-07T23:31:00.961ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
290472025-03-07T23:31:00.961ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
290482025-03-07T23:31:00.961ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290492025-03-07T23:31:00.961ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290502025-03-07T23:31:00.962ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290512025-03-07T23:31:00.966ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
290522025-03-07T23:31:00.966ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290532025-03-07T23:31:00.966ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290542025-03-07T23:31:00.967ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290552025-03-07T23:31:00.971ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
290562025-03-07T23:31:00.971ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290572025-03-07T23:31:00.971ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290582025-03-07T23:31:00.972ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290592025-03-07T23:31:00.986ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
290602025-03-07T23:31:00.995ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290612025-03-07T23:31:00.998ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks?project=demo-project
290622025-03-07T23:31:00.998ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks?project=demo-project
290632025-03-07T23:31:00.998ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290642025-03-07T23:31:00.998ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290652025-03-07T23:31:00.998ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290662025-03-07T23:31:01.004ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks?project=demo-project
290672025-03-07T23:31:01.004ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290682025-03-07T23:31:01.004ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290692025-03-07T23:31:01.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290702025-03-07T23:31:01.011ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks?project=demo-project
290712025-03-07T23:31:01.011ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290722025-03-07T23:31:01.011ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290732025-03-07T23:31:01.011ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290742025-03-07T23:31:01.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/disks?project=demo-project
290752025-03-07T23:31:01.056ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290762025-03-07T23:31:01.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database uri = /v1/instances/demo-instance/disks?project=demo-project
290772025-03-07T23:31:01.056ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks?project=demo-project
290782025-03-07T23:31:01.064ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks?project=demo-project
290792025-03-07T23:31:01.065ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
290802025-03-07T23:31:01.065ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
290812025-03-07T23:31:01.065ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
290822025-03-07T23:31:01.070ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 184596 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e5d8b261-fb8d-445e-ac12-56e8ca9f262d response_code = 200 uri = /v1/instances/demo-instance/disks?project=demo-project
290832025-03-07T23:31:01.070ZINFOtest_unauthorized (external client test context): client received response status = 200
290842025-03-07T23:31:01.071ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/disks/attach?project=demo-project
290852025-03-07T23:31:01.071ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/disks/attach?project=demo-project
290862025-03-07T23:31:01.071ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
290872025-03-07T23:31:01.071ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
290882025-03-07T23:31:01.071ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1657a47-68a0-40bc-96be-c75f1f7a4b3f uri = /v1/instances/demo-instance/disks/attach?project=demo-project
290892025-03-07T23:31:01.071ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 417 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e1657a47-68a0-40bc-96be-c75f1f7a4b3f response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
290902025-03-07T23:31:01.072ZINFOtest_unauthorized (external client test context): client received response status = 405
290912025-03-07T23:31:01.072ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
290922025-03-07T23:31:01.072ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
290932025-03-07T23:31:01.072ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f56827a5-fbf8-4c59-b6dc-88c271f9a477 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
290942025-03-07T23:31:01.072ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f56827a5-fbf8-4c59-b6dc-88c271f9a477 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
290952025-03-07T23:31:01.072ZINFOtest_unauthorized (external client test context): client received response status = 405
290962025-03-07T23:31:01.072ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
290972025-03-07T23:31:01.072ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
290982025-03-07T23:31:01.073ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 356b8013-198e-49fd-82c1-a4fa3fbbac3a uri = /v1/instances/demo-instance/disks/attach?project=demo-project
290992025-03-07T23:31:01.073ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 356b8013-198e-49fd-82c1-a4fa3fbbac3a response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291002025-03-07T23:31:01.073ZINFOtest_unauthorized (external client test context): client received response status = 405
291012025-03-07T23:31:01.073ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/disks/attach?project=demo-project
291022025-03-07T23:31:01.073ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
291032025-03-07T23:31:01.073ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 49c2be64-fa72-49aa-8977-200c956c87a4 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291042025-03-07T23:31:01.073ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 49c2be64-fa72-49aa-8977-200c956c87a4 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291052025-03-07T23:31:01.074ZINFOtest_unauthorized (external client test context): client received response status = 405
291062025-03-07T23:31:01.074ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
291072025-03-07T23:31:01.074ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
291082025-03-07T23:31:01.074ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 473df43c-c535-455b-99ba-86fc7aabd55a uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291092025-03-07T23:31:01.074ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 473df43c-c535-455b-99ba-86fc7aabd55a response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291102025-03-07T23:31:01.074ZINFOtest_unauthorized (external client test context): client received response status = 405
291112025-03-07T23:31:01.074ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
291122025-03-07T23:31:01.075ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
291132025-03-07T23:31:01.075ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 67ca41a3-f1b9-469a-9960-fd6132abadda uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291142025-03-07T23:31:01.075ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 326 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 67ca41a3-f1b9-469a-9960-fd6132abadda response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291152025-03-07T23:31:01.076ZINFOtest_unauthorized (external client test context): client received response status = 405
291162025-03-07T23:31:01.076ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
291172025-03-07T23:31:01.076ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
291182025-03-07T23:31:01.076ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 005bd6c0-8e73-41c3-8837-6fe46c04f337 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291192025-03-07T23:31:01.076ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 005bd6c0-8e73-41c3-8837-6fe46c04f337 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291202025-03-07T23:31:01.076ZINFOtest_unauthorized (external client test context): client received response status = 405
291212025-03-07T23:31:01.076ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/disks/attach?project=demo-project
291222025-03-07T23:31:01.076ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
291232025-03-07T23:31:01.077ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9aab6b3b-b86b-4d1a-817f-59b1318405d8 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291242025-03-07T23:31:01.077ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9aab6b3b-b86b-4d1a-817f-59b1318405d8 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291252025-03-07T23:31:01.077ZINFOtest_unauthorized (external client test context): client received response status = 405
291262025-03-07T23:31:01.077ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
291272025-03-07T23:31:01.077ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
291282025-03-07T23:31:01.077ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291292025-03-07T23:31:01.078ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291302025-03-07T23:31:01.078ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291312025-03-07T23:31:01.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291322025-03-07T23:31:01.078ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291332025-03-07T23:31:01.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291342025-03-07T23:31:01.085ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291352025-03-07T23:31:01.085ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291362025-03-07T23:31:01.086ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291372025-03-07T23:31:01.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
291382025-03-07T23:31:01.100ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
291392025-03-07T23:31:01.100ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291402025-03-07T23:31:01.100ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291412025-03-07T23:31:01.101ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291422025-03-07T23:31:01.214ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:60693 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
291432025-03-07T23:31:01.215ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
291442025-03-07T23:31:01.215ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
291452025-03-07T23:31:01.215ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
291462025-03-07T23:31:01.216ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
291472025-03-07T23:31:01.218ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
291482025-03-07T23:31:01.218ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291492025-03-07T23:31:01.218ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291502025-03-07T23:31:01.222ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291512025-03-07T23:31:01.223ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:60693 req_id = 4467caee-39a5-4c98-8157-aa1da2e7bc52 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
291522025-03-07T23:31:01.257ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
291532025-03-07T23:31:01.261ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
291542025-03-07T23:31:01.261ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291552025-03-07T23:31:01.261ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291562025-03-07T23:31:01.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291572025-03-07T23:31:01.263ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 40227 local_addr = [::1]:37181 method = GET remote_addr = [::1]:60693 req_id = 4467caee-39a5-4c98-8157-aa1da2e7bc52 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
291582025-03-07T23:31:01.265ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
291592025-03-07T23:31:01.265ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
291602025-03-07T23:31:01.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
291612025-03-07T23:31:01.269ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
291622025-03-07T23:31:01.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291632025-03-07T23:31:01.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291642025-03-07T23:31:01.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291652025-03-07T23:31:01.271ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
291662025-03-07T23:31:01.271ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
291672025-03-07T23:31:01.273ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
291682025-03-07T23:31:01.273ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
291692025-03-07T23:31:01.273ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
291702025-03-07T23:31:01.274ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
291712025-03-07T23:31:01.280ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
291722025-03-07T23:31:01.284ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
291732025-03-07T23:31:01.285ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291742025-03-07T23:31:01.285ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291752025-03-07T23:31:01.285ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291762025-03-07T23:31:01.286ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291772025-03-07T23:31:01.298ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291782025-03-07T23:31:01.298ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291792025-03-07T23:31:01.299ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291802025-03-07T23:31:01.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291812025-03-07T23:31:01.306ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291822025-03-07T23:31:01.307ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291832025-03-07T23:31:01.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291842025-03-07T23:31:01.314ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291852025-03-07T23:31:01.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291862025-03-07T23:31:01.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291872025-03-07T23:31:01.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291882025-03-07T23:31:01.316ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
291892025-03-07T23:31:01.321ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291902025-03-07T23:31:01.321ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291912025-03-07T23:31:01.321ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291922025-03-07T23:31:01.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291932025-03-07T23:31:01.358ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291942025-03-07T23:31:01.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291952025-03-07T23:31:01.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291962025-03-07T23:31:01.359ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291972025-03-07T23:31:01.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291982025-03-07T23:31:01.387ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/disks/attach?project=demo-project
291992025-03-07T23:31:01.388ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 310049 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b967e47-322c-4563-817f-507f7cf11c7f response_code = 404 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292002025-03-07T23:31:01.389ZINFOtest_unauthorized (external client test context): client received response status = 404
292012025-03-07T23:31:01.389ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
292022025-03-07T23:31:01.389ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292032025-03-07T23:31:01.390ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b8edd8a-a73d-47e1-898b-25f282767ddb uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292042025-03-07T23:31:01.391ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b8edd8a-a73d-47e1-898b-25f282767ddb uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292052025-03-07T23:31:01.391ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b8edd8a-a73d-47e1-898b-25f282767ddb uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292062025-03-07T23:31:01.391ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b8edd8a-a73d-47e1-898b-25f282767ddb uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292072025-03-07T23:31:01.391ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 783 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3b8edd8a-a73d-47e1-898b-25f282767ddb response_code = 401 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292082025-03-07T23:31:01.391ZINFOtest_unauthorized (external client test context): client received response status = 401
292092025-03-07T23:31:01.391ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
292102025-03-07T23:31:01.391ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292112025-03-07T23:31:01.392ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bf14fc4f-8503-4c05-858d-b1079d6f1131 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292122025-03-07T23:31:01.392ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bf14fc4f-8503-4c05-858d-b1079d6f1131 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292132025-03-07T23:31:01.392ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bf14fc4f-8503-4c05-858d-b1079d6f1131 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292142025-03-07T23:31:01.392ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 253 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = bf14fc4f-8503-4c05-858d-b1079d6f1131 response_code = 401 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292152025-03-07T23:31:01.392ZINFOtest_unauthorized (external client test context): client received response status = 401
292162025-03-07T23:31:01.392ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/disks/attach?project=demo-project
292172025-03-07T23:31:01.392ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292182025-03-07T23:31:01.392ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30feb274-8686-43e1-8135-34cea177d7ec uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292192025-03-07T23:31:01.392ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30feb274-8686-43e1-8135-34cea177d7ec uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292202025-03-07T23:31:01.394ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2460:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2476:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_attach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30feb274-8686-43e1-8135-34cea177d7ec uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292212025-03-07T23:31:01.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1150 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 30feb274-8686-43e1-8135-34cea177d7ec response_code = 401 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292222025-03-07T23:31:01.394ZINFOtest_unauthorized (external client test context): client received response status = 401
292232025-03-07T23:31:01.394ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292242025-03-07T23:31:01.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292252025-03-07T23:31:01.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 750d800e-a21c-4fe6-910f-9231adddac89 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292262025-03-07T23:31:01.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 750d800e-a21c-4fe6-910f-9231adddac89 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292272025-03-07T23:31:01.394ZINFOtest_unauthorized (external client test context): client received response status = 405
292282025-03-07T23:31:01.394ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292292025-03-07T23:31:01.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292302025-03-07T23:31:01.394ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a0cc99ca-035f-445b-b799-7e9ce7074569 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292312025-03-07T23:31:01.395ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a0cc99ca-035f-445b-b799-7e9ce7074569 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292322025-03-07T23:31:01.395ZINFOtest_unauthorized (external client test context): client received response status = 405
292332025-03-07T23:31:01.395ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292342025-03-07T23:31:01.395ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292352025-03-07T23:31:01.395ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5dcada71-aad2-458e-9975-6369203b2618 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292362025-03-07T23:31:01.395ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5dcada71-aad2-458e-9975-6369203b2618 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292372025-03-07T23:31:01.395ZINFOtest_unauthorized (external client test context): client received response status = 405
292382025-03-07T23:31:01.395ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292392025-03-07T23:31:01.395ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292402025-03-07T23:31:01.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 975e036f-3dcf-49f2-b18d-12c4d4e89f01 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292412025-03-07T23:31:01.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 111 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 975e036f-3dcf-49f2-b18d-12c4d4e89f01 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292422025-03-07T23:31:01.396ZINFOtest_unauthorized (external client test context): client received response status = 405
292432025-03-07T23:31:01.396ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292442025-03-07T23:31:01.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292452025-03-07T23:31:01.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 30e932a7-8255-4e38-898f-be9f3bd02bf2 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292462025-03-07T23:31:01.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 30e932a7-8255-4e38-898f-be9f3bd02bf2 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292472025-03-07T23:31:01.396ZINFOtest_unauthorized (external client test context): client received response status = 405
292482025-03-07T23:31:01.396ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292492025-03-07T23:31:01.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292502025-03-07T23:31:01.397ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0f3796e0-c9ab-41cd-947d-3e4d2b50a7e4 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292512025-03-07T23:31:01.397ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0f3796e0-c9ab-41cd-947d-3e4d2b50a7e4 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292522025-03-07T23:31:01.397ZINFOtest_unauthorized (external client test context): client received response status = 405
292532025-03-07T23:31:01.397ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292542025-03-07T23:31:01.397ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292552025-03-07T23:31:01.397ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f120311c-aa72-410b-a467-3170a6ebd120 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292562025-03-07T23:31:01.397ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f120311c-aa72-410b-a467-3170a6ebd120 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292572025-03-07T23:31:01.397ZINFOtest_unauthorized (external client test context): client received response status = 405
292582025-03-07T23:31:01.397ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/disks/attach?project=demo-project
292592025-03-07T23:31:01.397ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/attach?project=demo-project
292602025-03-07T23:31:01.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7db4e702-4ca5-41a5-94ad-34a580a8bcb2 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292612025-03-07T23:31:01.398ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7db4e702-4ca5-41a5-94ad-34a580a8bcb2 response_code = 405 uri = /v1/instances/demo-instance/disks/attach?project=demo-project
292622025-03-07T23:31:01.398ZINFOtest_unauthorized (external client test context): client received response status = 405
292632025-03-07T23:31:01.398ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/disks/attach?project=demo-project
292642025-03-07T23:31:01.398ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/disks/detach?project=demo-project
292652025-03-07T23:31:01.398ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/disks/detach?project=demo-project
292662025-03-07T23:31:01.398ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
292672025-03-07T23:31:01.398ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292682025-03-07T23:31:01.398ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 220669f2-7bb4-41ff-b96c-515ee1fd0f31 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292692025-03-07T23:31:01.398ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 220669f2-7bb4-41ff-b96c-515ee1fd0f31 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292702025-03-07T23:31:01.399ZINFOtest_unauthorized (external client test context): client received response status = 405
292712025-03-07T23:31:01.399ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
292722025-03-07T23:31:01.399ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292732025-03-07T23:31:01.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 37a1df25-e86d-4c0b-b645-d677a796cfa6 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292742025-03-07T23:31:01.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 37a1df25-e86d-4c0b-b645-d677a796cfa6 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292752025-03-07T23:31:01.399ZINFOtest_unauthorized (external client test context): client received response status = 405
292762025-03-07T23:31:01.399ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
292772025-03-07T23:31:01.399ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292782025-03-07T23:31:01.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c2996b5d-2a81-4b83-8ebc-be862d25ac25 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292792025-03-07T23:31:01.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c2996b5d-2a81-4b83-8ebc-be862d25ac25 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292802025-03-07T23:31:01.400ZINFOtest_unauthorized (external client test context): client received response status = 405
292812025-03-07T23:31:01.400ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/disks/detach?project=demo-project
292822025-03-07T23:31:01.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292832025-03-07T23:31:01.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f2ddcafe-d67a-4efd-bd92-23e0be8c137b uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292842025-03-07T23:31:01.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f2ddcafe-d67a-4efd-bd92-23e0be8c137b response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292852025-03-07T23:31:01.400ZINFOtest_unauthorized (external client test context): client received response status = 405
292862025-03-07T23:31:01.400ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
292872025-03-07T23:31:01.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292882025-03-07T23:31:01.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 99bf5cab-0a12-4b94-9663-26195a81de0b uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292892025-03-07T23:31:01.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 99bf5cab-0a12-4b94-9663-26195a81de0b response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292902025-03-07T23:31:01.401ZINFOtest_unauthorized (external client test context): client received response status = 405
292912025-03-07T23:31:01.401ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
292922025-03-07T23:31:01.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292932025-03-07T23:31:01.401ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f5d719e-d3ed-4a99-8b81-0488ecf3fadf uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292942025-03-07T23:31:01.401ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 103 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4f5d719e-d3ed-4a99-8b81-0488ecf3fadf response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292952025-03-07T23:31:01.401ZINFOtest_unauthorized (external client test context): client received response status = 405
292962025-03-07T23:31:01.401ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
292972025-03-07T23:31:01.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
292982025-03-07T23:31:01.401ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2465c1d8-e76a-403a-b8ba-4e54b2e30b8f uri = /v1/instances/demo-instance/disks/detach?project=demo-project
292992025-03-07T23:31:01.402ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2465c1d8-e76a-403a-b8ba-4e54b2e30b8f response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293002025-03-07T23:31:01.402ZINFOtest_unauthorized (external client test context): client received response status = 405
293012025-03-07T23:31:01.402ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/disks/detach?project=demo-project
293022025-03-07T23:31:01.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
293032025-03-07T23:31:01.402ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 563c3f2c-802b-4acf-9195-0019ee2be5de uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293042025-03-07T23:31:01.402ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 563c3f2c-802b-4acf-9195-0019ee2be5de response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293052025-03-07T23:31:01.402ZINFOtest_unauthorized (external client test context): client received response status = 405
293062025-03-07T23:31:01.402ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
293072025-03-07T23:31:01.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
293082025-03-07T23:31:01.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293092025-03-07T23:31:01.403ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293102025-03-07T23:31:01.403ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293112025-03-07T23:31:01.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293122025-03-07T23:31:01.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293132025-03-07T23:31:01.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293142025-03-07T23:31:01.406ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293152025-03-07T23:31:01.406ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293162025-03-07T23:31:01.407ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293172025-03-07T23:31:01.410ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
293182025-03-07T23:31:01.411ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
293192025-03-07T23:31:01.411ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293202025-03-07T23:31:01.411ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293212025-03-07T23:31:01.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293222025-03-07T23:31:01.412ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
293232025-03-07T23:31:01.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
293242025-03-07T23:31:01.413ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7294c6d7-96c0-4db8-b997-c12ccd8110e1 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
293252025-03-07T23:31:01.413ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7294c6d7-96c0-4db8-b997-c12ccd8110e1 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
293262025-03-07T23:31:01.413ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7294c6d7-96c0-4db8-b997-c12ccd8110e1 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
293272025-03-07T23:31:01.414ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7294c6d7-96c0-4db8-b997-c12ccd8110e1 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
293282025-03-07T23:31:01.414ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
293292025-03-07T23:31:01.414ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293302025-03-07T23:31:01.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293312025-03-07T23:31:01.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293322025-03-07T23:31:01.426ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 13125 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = 7294c6d7-96c0-4db8-b997-c12ccd8110e1 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
293332025-03-07T23:31:01.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
293342025-03-07T23:31:01.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
293352025-03-07T23:31:01.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293362025-03-07T23:31:01.434ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293372025-03-07T23:31:01.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293382025-03-07T23:31:01.436ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "7294c6d7-96c0-4db8-b997-c12ccd8110e1", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:00 GMT"} })
293392025-03-07T23:31:01.437ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
293402025-03-07T23:31:01.437ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = ee9d1380-60f6-409c-8f8b-c3ee2a45c7db uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
293412025-03-07T23:31:01.438ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = ee9d1380-60f6-409c-8f8b-c3ee2a45c7db resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
293422025-03-07T23:31:01.438ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = ee9d1380-60f6-409c-8f8b-c3ee2a45c7db roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
293432025-03-07T23:31:01.439ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = ee9d1380-60f6-409c-8f8b-c3ee2a45c7db resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
293442025-03-07T23:31:01.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
293452025-03-07T23:31:01.439ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
293462025-03-07T23:31:01.439ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293472025-03-07T23:31:01.439ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293482025-03-07T23:31:01.440ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293492025-03-07T23:31:01.442ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4874 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:41077 req_id = ee9d1380-60f6-409c-8f8b-c3ee2a45c7db response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
293502025-03-07T23:31:01.442ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
293512025-03-07T23:31:01.443ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
293522025-03-07T23:31:01.443ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
293532025-03-07T23:31:01.444ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
293542025-03-07T23:31:01.461ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "ee9d1380-60f6-409c-8f8b-c3ee2a45c7db", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:00 GMT"} })
293552025-03-07T23:31:01.462ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
293562025-03-07T23:31:01.462ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
293572025-03-07T23:31:01.462ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
293582025-03-07T23:31:01.463ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
293592025-03-07T23:31:01.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
293602025-03-07T23:31:01.468ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293612025-03-07T23:31:01.468ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293622025-03-07T23:31:01.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293632025-03-07T23:31:01.469ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293642025-03-07T23:31:01.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293652025-03-07T23:31:01.473ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293662025-03-07T23:31:01.474ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293672025-03-07T23:31:01.478ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293682025-03-07T23:31:01.478ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293692025-03-07T23:31:01.478ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293702025-03-07T23:31:01.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293712025-03-07T23:31:01.482ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293722025-03-07T23:31:01.482ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293732025-03-07T23:31:01.482ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293742025-03-07T23:31:01.483ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293752025-03-07T23:31:01.498ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293762025-03-07T23:31:01.501ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293772025-03-07T23:31:01.501ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293782025-03-07T23:31:01.502ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293792025-03-07T23:31:01.516ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293802025-03-07T23:31:01.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293812025-03-07T23:31:01.517ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293822025-03-07T23:31:01.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293832025-03-07T23:31:01.522ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293842025-03-07T23:31:01.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293852025-03-07T23:31:01.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 150846 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 88e59b33-cc89-4a72-869c-818867ca8a11 response_code = 404 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293862025-03-07T23:31:01.555ZINFOtest_unauthorized (external client test context): client received response status = 404
293872025-03-07T23:31:01.556ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
293882025-03-07T23:31:01.556ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
293892025-03-07T23:31:01.556ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5f31a939-8682-4a4b-af19-beb41d8165e8 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293902025-03-07T23:31:01.557ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5f31a939-8682-4a4b-af19-beb41d8165e8 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293912025-03-07T23:31:01.557ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5f31a939-8682-4a4b-af19-beb41d8165e8 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293922025-03-07T23:31:01.557ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5f31a939-8682-4a4b-af19-beb41d8165e8 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293932025-03-07T23:31:01.557ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 654 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5f31a939-8682-4a4b-af19-beb41d8165e8 response_code = 401 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293942025-03-07T23:31:01.558ZINFOtest_unauthorized (external client test context): client received response status = 401
293952025-03-07T23:31:01.558ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
293962025-03-07T23:31:01.558ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
293972025-03-07T23:31:01.558ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74944e31-216e-4a85-91b2-3040c54f50b4 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293982025-03-07T23:31:01.558ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74944e31-216e-4a85-91b2-3040c54f50b4 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
293992025-03-07T23:31:01.558ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74944e31-216e-4a85-91b2-3040c54f50b4 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294002025-03-07T23:31:01.558ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 190 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74944e31-216e-4a85-91b2-3040c54f50b4 response_code = 401 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294012025-03-07T23:31:01.558ZINFOtest_unauthorized (external client test context): client received response status = 401
294022025-03-07T23:31:01.558ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/disks/detach?project=demo-project
294032025-03-07T23:31:01.558ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294042025-03-07T23:31:01.558ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cb646397-9792-40eb-9cb9-56abb03b9f99 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294052025-03-07T23:31:01.558ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cb646397-9792-40eb-9cb9-56abb03b9f99 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294062025-03-07T23:31:01.560ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2488:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2508:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_disk_detach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::DiskPath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Disk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cb646397-9792-40eb-9cb9-56abb03b9f99 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294072025-03-07T23:31:01.560ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1736 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cb646397-9792-40eb-9cb9-56abb03b9f99 response_code = 401 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294082025-03-07T23:31:01.560ZINFOtest_unauthorized (external client test context): client received response status = 401
294092025-03-07T23:31:01.560ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294102025-03-07T23:31:01.560ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294112025-03-07T23:31:01.561ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5d7ceb9c-7900-46c4-86c1-11eddb421dc5 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294122025-03-07T23:31:01.561ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5d7ceb9c-7900-46c4-86c1-11eddb421dc5 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294132025-03-07T23:31:01.561ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
294142025-03-07T23:31:01.561ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
294152025-03-07T23:31:01.562ZINFOtest_unauthorized (external client test context): client received response status = 405
294162025-03-07T23:31:01.562ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294172025-03-07T23:31:01.562ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294182025-03-07T23:31:01.563ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9a78dbc9-0312-4641-bee3-26b7747e12bd uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294192025-03-07T23:31:01.564ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 227 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9a78dbc9-0312-4641-bee3-26b7747e12bd response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294202025-03-07T23:31:01.564ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
294212025-03-07T23:31:01.565ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
294222025-03-07T23:31:01.565ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
294232025-03-07T23:31:01.565ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
294242025-03-07T23:31:01.565ZINFOtest_unauthorized (external client test context): client received response status = 405
294252025-03-07T23:31:01.566ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294262025-03-07T23:31:01.566ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294272025-03-07T23:31:01.566ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 28b52a8f-e4fb-41c9-b2bc-e5ee89acb9b4 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294282025-03-07T23:31:01.566ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 28b52a8f-e4fb-41c9-b2bc-e5ee89acb9b4 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294292025-03-07T23:31:01.566ZINFOtest_unauthorized (external client test context): client received response status = 405
294302025-03-07T23:31:01.566ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294312025-03-07T23:31:01.567ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294322025-03-07T23:31:01.567ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5b9187d2-3d38-44d3-82ab-576eeb0d8e91 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294332025-03-07T23:31:01.567ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5b9187d2-3d38-44d3-82ab-576eeb0d8e91 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294342025-03-07T23:31:01.567ZINFOtest_unauthorized (external client test context): client received response status = 405
294352025-03-07T23:31:01.567ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294362025-03-07T23:31:01.568ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294372025-03-07T23:31:01.568ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 69f3c69e-173f-46da-a6e6-2b2376fe1b6d uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294382025-03-07T23:31:01.568ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 146 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 69f3c69e-173f-46da-a6e6-2b2376fe1b6d response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294392025-03-07T23:31:01.568ZINFOtest_unauthorized (external client test context): client received response status = 405
294402025-03-07T23:31:01.568ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294412025-03-07T23:31:01.569ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294422025-03-07T23:31:01.569ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 84171b12-ca45-438d-a80d-c6dd4409bd00 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294432025-03-07T23:31:01.569ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 145 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 84171b12-ca45-438d-a80d-c6dd4409bd00 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294442025-03-07T23:31:01.569ZINFOtest_unauthorized (external client test context): client received response status = 405
294452025-03-07T23:31:01.569ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294462025-03-07T23:31:01.570ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294472025-03-07T23:31:01.570ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ff260bc6-5d7e-48b7-8730-67193cc04dcd uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294482025-03-07T23:31:01.570ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 250 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ff260bc6-5d7e-48b7-8730-67193cc04dcd response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294492025-03-07T23:31:01.570ZINFOtest_unauthorized (external client test context): client received response status = 405
294502025-03-07T23:31:01.570ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/disks/detach?project=demo-project
294512025-03-07T23:31:01.571ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/disks/detach?project=demo-project
294522025-03-07T23:31:01.571ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 19c04750-5c23-4a1c-83a4-98c7022686b9 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294532025-03-07T23:31:01.571ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 142 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 19c04750-5c23-4a1c-83a4-98c7022686b9 response_code = 405 uri = /v1/instances/demo-instance/disks/detach?project=demo-project
294542025-03-07T23:31:01.571ZINFOtest_unauthorized (external client test context): client received response status = 405
294552025-03-07T23:31:01.571ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/disks/detach?project=demo-project
294562025-03-07T23:31:01.572ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups?project=demo-project
294572025-03-07T23:31:01.572ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups?project=demo-project
294582025-03-07T23:31:01.572ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
294592025-03-07T23:31:01.572ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 uri = /v1/affinity-groups?project=demo-project
294602025-03-07T23:31:01.572ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 uri = /v1/affinity-groups?project=demo-project
294612025-03-07T23:31:01.572ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups?project=demo-project
294622025-03-07T23:31:01.573ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294632025-03-07T23:31:01.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294642025-03-07T23:31:01.573ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294652025-03-07T23:31:01.590ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294662025-03-07T23:31:01.590ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294672025-03-07T23:31:01.591ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294682025-03-07T23:31:01.595ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
294692025-03-07T23:31:01.595ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
294702025-03-07T23:31:01.595ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294712025-03-07T23:31:01.595ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294722025-03-07T23:31:01.595ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294732025-03-07T23:31:01.602ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
294742025-03-07T23:31:01.602ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294752025-03-07T23:31:01.602ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294762025-03-07T23:31:01.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294772025-03-07T23:31:01.612ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
294782025-03-07T23:31:01.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
294792025-03-07T23:31:01.618ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294802025-03-07T23:31:01.618ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294812025-03-07T23:31:01.619ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294822025-03-07T23:31:01.622ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
294832025-03-07T23:31:01.622ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
294842025-03-07T23:31:01.623ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294852025-03-07T23:31:01.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294862025-03-07T23:31:01.623ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294872025-03-07T23:31:01.627ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
294882025-03-07T23:31:01.627ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
294892025-03-07T23:31:01.627ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
294902025-03-07T23:31:01.629ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
294912025-03-07T23:31:01.633ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
294922025-03-07T23:31:01.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
294932025-03-07T23:31:01.642ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 uri = /v1/affinity-groups?project=demo-project
294942025-03-07T23:31:01.642ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
294952025-03-07T23:31:01.643ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
294962025-03-07T23:31:01.643ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
294972025-03-07T23:31:01.664ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
294982025-03-07T23:31:01.664ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
294992025-03-07T23:31:01.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295002025-03-07T23:31:01.670ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
295012025-03-07T23:31:01.671ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
295022025-03-07T23:31:01.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295032025-03-07T23:31:01.671ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295042025-03-07T23:31:01.671ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295052025-03-07T23:31:01.682ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
295062025-03-07T23:31:01.682ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295072025-03-07T23:31:01.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295082025-03-07T23:31:01.683ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295092025-03-07T23:31:01.688ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
295102025-03-07T23:31:01.688ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295112025-03-07T23:31:01.688ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295122025-03-07T23:31:01.689ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295132025-03-07T23:31:01.692ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
295142025-03-07T23:31:01.699ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295152025-03-07T23:31:01.700ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
295162025-03-07T23:31:01.700ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
295172025-03-07T23:31:01.700ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295182025-03-07T23:31:01.700ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295192025-03-07T23:31:01.701ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295202025-03-07T23:31:01.715ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
295212025-03-07T23:31:01.715ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295222025-03-07T23:31:01.715ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295232025-03-07T23:31:01.716ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295242025-03-07T23:31:01.720ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
295252025-03-07T23:31:01.720ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295262025-03-07T23:31:01.720ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295272025-03-07T23:31:01.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295282025-03-07T23:31:01.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
295292025-03-07T23:31:01.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295302025-03-07T23:31:01.734ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database uri = /v1/affinity-groups?project=demo-project
295312025-03-07T23:31:01.734ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295322025-03-07T23:31:01.734ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295332025-03-07T23:31:01.741ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 169203 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b758bbf5-3e19-4aa6-b490-03c00b7f9204 response_code = 200 uri = /v1/affinity-groups?project=demo-project
295342025-03-07T23:31:01.742ZINFOtest_unauthorized (external client test context): client received response status = 200
295352025-03-07T23:31:01.742ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups?project=demo-project
295362025-03-07T23:31:01.742ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
295372025-03-07T23:31:01.743ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca uri = /v1/affinity-groups?project=demo-project
295382025-03-07T23:31:01.743ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca uri = /v1/affinity-groups?project=demo-project
295392025-03-07T23:31:01.743ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups?project=demo-project
295402025-03-07T23:31:01.743ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295412025-03-07T23:31:01.744ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295422025-03-07T23:31:01.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295432025-03-07T23:31:01.753ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295442025-03-07T23:31:01.753ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295452025-03-07T23:31:01.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295462025-03-07T23:31:01.757ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
295472025-03-07T23:31:01.757ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
295482025-03-07T23:31:01.757ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295492025-03-07T23:31:01.757ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295502025-03-07T23:31:01.758ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295512025-03-07T23:31:01.764ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
295522025-03-07T23:31:01.765ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295532025-03-07T23:31:01.765ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295542025-03-07T23:31:01.765ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295552025-03-07T23:31:01.771ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
295562025-03-07T23:31:01.775ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
295572025-03-07T23:31:01.775ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295582025-03-07T23:31:01.775ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295592025-03-07T23:31:01.775ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295602025-03-07T23:31:01.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
295612025-03-07T23:31:01.779ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
295622025-03-07T23:31:01.779ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295632025-03-07T23:31:01.779ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295642025-03-07T23:31:01.780ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295652025-03-07T23:31:01.787ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
295662025-03-07T23:31:01.787ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
295672025-03-07T23:31:01.787ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
295682025-03-07T23:31:01.788ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
295692025-03-07T23:31:01.790ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
295702025-03-07T23:31:01.794ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
295712025-03-07T23:31:01.794ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca uri = /v1/affinity-groups?project=demo-project
295722025-03-07T23:31:01.794ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database uri = /v1/affinity-groups?project=demo-project
295732025-03-07T23:31:01.794ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295742025-03-07T23:31:01.795ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295752025-03-07T23:31:01.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database uri = /v1/affinity-groups?project=demo-project
295762025-03-07T23:31:01.797ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295772025-03-07T23:31:01.798ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295782025-03-07T23:31:01.800ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
295792025-03-07T23:31:01.800ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
295802025-03-07T23:31:01.800ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database uri = /v1/affinity-groups?project=demo-project
295812025-03-07T23:31:01.800ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295822025-03-07T23:31:01.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295832025-03-07T23:31:01.804ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
295842025-03-07T23:31:01.804ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database uri = /v1/affinity-groups?project=demo-project
295852025-03-07T23:31:01.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295862025-03-07T23:31:01.805ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295872025-03-07T23:31:01.809ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
295882025-03-07T23:31:01.809ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database uri = /v1/affinity-groups?project=demo-project
295892025-03-07T23:31:01.809ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295902025-03-07T23:31:01.810ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
295912025-03-07T23:31:01.813ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
295922025-03-07T23:31:01.836ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/affinity-groups?project=demo-project
295932025-03-07T23:31:01.837ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 93411 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c7e1de1b-722a-4442-b08a-2250f9bfabca response_code = 404 uri = /v1/affinity-groups?project=demo-project
295942025-03-07T23:31:01.837ZINFOtest_unauthorized (external client test context): client received response status = 404
295952025-03-07T23:31:01.837ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups?project=demo-project
295962025-03-07T23:31:01.837ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
295972025-03-07T23:31:01.838ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96c07106-d5b5-4263-9b55-54b5435e6a6f uri = /v1/affinity-groups?project=demo-project
295982025-03-07T23:31:01.838ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96c07106-d5b5-4263-9b55-54b5435e6a6f uri = /v1/affinity-groups?project=demo-project
295992025-03-07T23:31:01.838ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96c07106-d5b5-4263-9b55-54b5435e6a6f uri = /v1/affinity-groups?project=demo-project
296002025-03-07T23:31:01.838ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96c07106-d5b5-4263-9b55-54b5435e6a6f uri = /v1/affinity-groups?project=demo-project
296012025-03-07T23:31:01.838ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 382 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 96c07106-d5b5-4263-9b55-54b5435e6a6f response_code = 401 uri = /v1/affinity-groups?project=demo-project
296022025-03-07T23:31:01.838ZINFOtest_unauthorized (external client test context): client received response status = 401
296032025-03-07T23:31:01.838ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups?project=demo-project
296042025-03-07T23:31:01.838ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296052025-03-07T23:31:01.839ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02c8b79d-775b-40ae-8ea6-c036b9f584ac uri = /v1/affinity-groups?project=demo-project
296062025-03-07T23:31:01.839ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02c8b79d-775b-40ae-8ea6-c036b9f584ac uri = /v1/affinity-groups?project=demo-project
296072025-03-07T23:31:01.839ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02c8b79d-775b-40ae-8ea6-c036b9f584ac uri = /v1/affinity-groups?project=demo-project
296082025-03-07T23:31:01.839ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 249 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 02c8b79d-775b-40ae-8ea6-c036b9f584ac response_code = 401 uri = /v1/affinity-groups?project=demo-project
296092025-03-07T23:31:01.839ZINFOtest_unauthorized (external client test context): client received response status = 401
296102025-03-07T23:31:01.839ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups?project=demo-project
296112025-03-07T23:31:01.839ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296122025-03-07T23:31:01.839ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 95c6b656-e42c-458d-9fdd-44bd1fc2a24f uri = /v1/affinity-groups?project=demo-project
296132025-03-07T23:31:01.839ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 95c6b656-e42c-458d-9fdd-44bd1fc2a24f uri = /v1/affinity-groups?project=demo-project
296142025-03-07T23:31:01.842ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2522:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AffinityGroup>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2542:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AffinityGroup>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AffinityGroup>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 95c6b656-e42c-458d-9fdd-44bd1fc2a24f uri = /v1/affinity-groups?project=demo-project
296152025-03-07T23:31:01.842ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1611 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 95c6b656-e42c-458d-9fdd-44bd1fc2a24f response_code = 401 uri = /v1/affinity-groups?project=demo-project
296162025-03-07T23:31:01.842ZINFOtest_unauthorized (external client test context): client received response status = 401
296172025-03-07T23:31:01.842ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups?project=demo-project
296182025-03-07T23:31:01.842ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296192025-03-07T23:31:01.842ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 67b62850-a3b2-4226-843d-4e217ef2591e uri = /v1/affinity-groups?project=demo-project
296202025-03-07T23:31:01.842ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 67b62850-a3b2-4226-843d-4e217ef2591e response_code = 405 uri = /v1/affinity-groups?project=demo-project
296212025-03-07T23:31:01.842ZINFOtest_unauthorized (external client test context): client received response status = 405
296222025-03-07T23:31:01.842ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups?project=demo-project
296232025-03-07T23:31:01.842ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296242025-03-07T23:31:01.842ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4ae6d144-e21b-4023-a2ac-2d386ba57bd2 uri = /v1/affinity-groups?project=demo-project
296252025-03-07T23:31:01.842ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4ae6d144-e21b-4023-a2ac-2d386ba57bd2 response_code = 405 uri = /v1/affinity-groups?project=demo-project
296262025-03-07T23:31:01.842ZINFOtest_unauthorized (external client test context): client received response status = 405
296272025-03-07T23:31:01.842ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups?project=demo-project
296282025-03-07T23:31:01.842ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296292025-03-07T23:31:01.843ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2fdef7fc-b690-4980-b1a2-8dcda15edfb3 uri = /v1/affinity-groups?project=demo-project
296302025-03-07T23:31:01.843ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2fdef7fc-b690-4980-b1a2-8dcda15edfb3 response_code = 405 uri = /v1/affinity-groups?project=demo-project
296312025-03-07T23:31:01.843ZINFOtest_unauthorized (external client test context): client received response status = 405
296322025-03-07T23:31:01.843ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups?project=demo-project
296332025-03-07T23:31:01.843ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296342025-03-07T23:31:01.843ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4a4048dd-2e47-4f8f-8bda-01c4f6eca9e1 uri = /v1/affinity-groups?project=demo-project
296352025-03-07T23:31:01.843ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4a4048dd-2e47-4f8f-8bda-01c4f6eca9e1 response_code = 405 uri = /v1/affinity-groups?project=demo-project
296362025-03-07T23:31:01.843ZINFOtest_unauthorized (external client test context): client received response status = 405
296372025-03-07T23:31:01.844ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups?project=demo-project
296382025-03-07T23:31:01.844ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296392025-03-07T23:31:01.844ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb uri = /v1/affinity-groups?project=demo-project
296402025-03-07T23:31:01.844ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb uri = /v1/affinity-groups?project=demo-project
296412025-03-07T23:31:01.844ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups?project=demo-project
296422025-03-07T23:31:01.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296432025-03-07T23:31:01.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296442025-03-07T23:31:01.845ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296452025-03-07T23:31:01.847ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296462025-03-07T23:31:01.847ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296472025-03-07T23:31:01.848ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296482025-03-07T23:31:01.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
296492025-03-07T23:31:01.851ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
296502025-03-07T23:31:01.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296512025-03-07T23:31:01.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296522025-03-07T23:31:01.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296532025-03-07T23:31:01.853ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
296542025-03-07T23:31:01.853ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296552025-03-07T23:31:01.853ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296562025-03-07T23:31:01.854ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296572025-03-07T23:31:01.856ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
296582025-03-07T23:31:01.859ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
296592025-03-07T23:31:01.859ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296602025-03-07T23:31:01.859ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296612025-03-07T23:31:01.860ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296622025-03-07T23:31:01.862ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
296632025-03-07T23:31:01.862ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
296642025-03-07T23:31:01.862ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296652025-03-07T23:31:01.862ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296662025-03-07T23:31:01.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296672025-03-07T23:31:01.865ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
296682025-03-07T23:31:01.865ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
296692025-03-07T23:31:01.865ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
296702025-03-07T23:31:01.866ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
296712025-03-07T23:31:01.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
296722025-03-07T23:31:01.875ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
296732025-03-07T23:31:01.875ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb uri = /v1/affinity-groups?project=demo-project
296742025-03-07T23:31:01.875ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database uri = /v1/affinity-groups?project=demo-project
296752025-03-07T23:31:01.875ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
296762025-03-07T23:31:01.876ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
296772025-03-07T23:31:01.879ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database uri = /v1/affinity-groups?project=demo-project
296782025-03-07T23:31:01.879ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
296792025-03-07T23:31:01.880ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
296802025-03-07T23:31:01.882ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
296812025-03-07T23:31:01.882ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
296822025-03-07T23:31:01.882ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database uri = /v1/affinity-groups?project=demo-project
296832025-03-07T23:31:01.882ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
296842025-03-07T23:31:01.883ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
296852025-03-07T23:31:01.887ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
296862025-03-07T23:31:01.887ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database uri = /v1/affinity-groups?project=demo-project
296872025-03-07T23:31:01.887ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
296882025-03-07T23:31:01.887ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
296892025-03-07T23:31:01.891ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
296902025-03-07T23:31:01.891ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database uri = /v1/affinity-groups?project=demo-project
296912025-03-07T23:31:01.891ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
296922025-03-07T23:31:01.892ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
296932025-03-07T23:31:01.895ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
296942025-03-07T23:31:01.918ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/affinity-groups?project=demo-project
296952025-03-07T23:31:01.918ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 74108 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5ee7f178-5dcf-4fbc-83e5-540f44e0d2eb response_code = 404 uri = /v1/affinity-groups?project=demo-project
296962025-03-07T23:31:01.919ZINFOtest_unauthorized (external client test context): client received response status = 404
296972025-03-07T23:31:01.920ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups?project=demo-project
296982025-03-07T23:31:01.937ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
296992025-03-07T23:31:01.937ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6ac0dbc3-941a-4dd0-9627-08f31697bf9b uri = /v1/affinity-groups?project=demo-project
297002025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6ac0dbc3-941a-4dd0-9627-08f31697bf9b uri = /v1/affinity-groups?project=demo-project
297012025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6ac0dbc3-941a-4dd0-9627-08f31697bf9b uri = /v1/affinity-groups?project=demo-project
297022025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6ac0dbc3-941a-4dd0-9627-08f31697bf9b uri = /v1/affinity-groups?project=demo-project
297032025-03-07T23:31:01.947ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 446 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6ac0dbc3-941a-4dd0-9627-08f31697bf9b response_code = 401 uri = /v1/affinity-groups?project=demo-project
297042025-03-07T23:31:01.947ZINFOtest_unauthorized (external client test context): client received response status = 401
297052025-03-07T23:31:01.947ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups?project=demo-project
297062025-03-07T23:31:01.947ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297072025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c3c6eced-3928-4f8c-81d5-612feb8dda14 uri = /v1/affinity-groups?project=demo-project
297082025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c3c6eced-3928-4f8c-81d5-612feb8dda14 uri = /v1/affinity-groups?project=demo-project
297092025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c3c6eced-3928-4f8c-81d5-612feb8dda14 uri = /v1/affinity-groups?project=demo-project
297102025-03-07T23:31:01.947ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 219 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c3c6eced-3928-4f8c-81d5-612feb8dda14 response_code = 401 uri = /v1/affinity-groups?project=demo-project
297112025-03-07T23:31:01.947ZINFOtest_unauthorized (external client test context): client received response status = 401
297122025-03-07T23:31:01.947ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups?project=demo-project
297132025-03-07T23:31:01.947ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297142025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90b41b04-3b9d-4a30-8e03-550ee08c6738 uri = /v1/affinity-groups?project=demo-project
297152025-03-07T23:31:01.947ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90b41b04-3b9d-4a30-8e03-550ee08c6738 uri = /v1/affinity-groups?project=demo-project
297162025-03-07T23:31:01.948ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2765:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2783:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90b41b04-3b9d-4a30-8e03-550ee08c6738 uri = /v1/affinity-groups?project=demo-project
297172025-03-07T23:31:01.948ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1205 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90b41b04-3b9d-4a30-8e03-550ee08c6738 response_code = 401 uri = /v1/affinity-groups?project=demo-project
297182025-03-07T23:31:01.948ZINFOtest_unauthorized (external client test context): client received response status = 401
297192025-03-07T23:31:01.948ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups?project=demo-project
297202025-03-07T23:31:01.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297212025-03-07T23:31:01.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ee4b2f49-2573-4b4c-9766-1ecd4aa8940e uri = /v1/affinity-groups?project=demo-project
297222025-03-07T23:31:01.948ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ee4b2f49-2573-4b4c-9766-1ecd4aa8940e response_code = 405 uri = /v1/affinity-groups?project=demo-project
297232025-03-07T23:31:01.948ZINFOtest_unauthorized (external client test context): client received response status = 405
297242025-03-07T23:31:01.948ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups?project=demo-project
297252025-03-07T23:31:01.948ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297262025-03-07T23:31:01.948ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 44789f3e-ec55-4c0a-a6fa-9db4945887d1 uri = /v1/affinity-groups?project=demo-project
297272025-03-07T23:31:01.948ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 44789f3e-ec55-4c0a-a6fa-9db4945887d1 response_code = 405 uri = /v1/affinity-groups?project=demo-project
297282025-03-07T23:31:01.948ZINFOtest_unauthorized (external client test context): client received response status = 405
297292025-03-07T23:31:01.948ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups?project=demo-project
297302025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297312025-03-07T23:31:01.949ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d3dfe35a-28fd-465a-bd6b-394bf21dfce1 uri = /v1/affinity-groups?project=demo-project
297322025-03-07T23:31:01.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d3dfe35a-28fd-465a-bd6b-394bf21dfce1 response_code = 405 uri = /v1/affinity-groups?project=demo-project
297332025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client received response status = 405
297342025-03-07T23:31:01.949ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups?project=demo-project
297352025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297362025-03-07T23:31:01.949ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dc5a3c47-6fbb-4ce5-affe-8c143d869562 uri = /v1/affinity-groups?project=demo-project
297372025-03-07T23:31:01.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = dc5a3c47-6fbb-4ce5-affe-8c143d869562 response_code = 405 uri = /v1/affinity-groups?project=demo-project
297382025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client received response status = 405
297392025-03-07T23:31:01.949ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups?project=demo-project
297402025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297412025-03-07T23:31:01.949ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1318906d-ba39-4a90-a422-c50b47028fe9 uri = /v1/affinity-groups?project=demo-project
297422025-03-07T23:31:01.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1318906d-ba39-4a90-a422-c50b47028fe9 response_code = 405 uri = /v1/affinity-groups?project=demo-project
297432025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client received response status = 405
297442025-03-07T23:31:01.949ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups?project=demo-project
297452025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297462025-03-07T23:31:01.949ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bce275cd-317c-4b8c-b02b-f9585e7e0263 uri = /v1/affinity-groups?project=demo-project
297472025-03-07T23:31:01.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bce275cd-317c-4b8c-b02b-f9585e7e0263 response_code = 405 uri = /v1/affinity-groups?project=demo-project
297482025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client received response status = 405
297492025-03-07T23:31:01.949ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups?project=demo-project
297502025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297512025-03-07T23:31:01.949ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3f2df381-cefe-4b32-8825-d3d8a8bb913c uri = /v1/affinity-groups?project=demo-project
297522025-03-07T23:31:01.949ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3f2df381-cefe-4b32-8825-d3d8a8bb913c response_code = 405 uri = /v1/affinity-groups?project=demo-project
297532025-03-07T23:31:01.949ZINFOtest_unauthorized (external client test context): client received response status = 405
297542025-03-07T23:31:01.950ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups?project=demo-project
297552025-03-07T23:31:01.950ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297562025-03-07T23:31:01.950ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2013b73b-6199-4880-a560-d3b0e5edf1fd uri = /v1/affinity-groups?project=demo-project
297572025-03-07T23:31:01.950ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2013b73b-6199-4880-a560-d3b0e5edf1fd response_code = 405 uri = /v1/affinity-groups?project=demo-project
297582025-03-07T23:31:01.950ZINFOtest_unauthorized (external client test context): client received response status = 405
297592025-03-07T23:31:01.950ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups?project=demo-project
297602025-03-07T23:31:01.950ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups?project=demo-project
297612025-03-07T23:31:01.950ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a uri = /v1/affinity-groups?project=demo-project
297622025-03-07T23:31:01.950ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a uri = /v1/affinity-groups?project=demo-project
297632025-03-07T23:31:01.950ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups?project=demo-project
297642025-03-07T23:31:01.950ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297652025-03-07T23:31:01.950ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297662025-03-07T23:31:01.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297672025-03-07T23:31:01.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297682025-03-07T23:31:01.954ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297692025-03-07T23:31:01.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297702025-03-07T23:31:01.981ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
297712025-03-07T23:31:01.981ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
297722025-03-07T23:31:01.981ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297732025-03-07T23:31:01.981ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297742025-03-07T23:31:01.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297752025-03-07T23:31:02.004ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
297762025-03-07T23:31:02.004ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297772025-03-07T23:31:02.007ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297782025-03-07T23:31:02.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297792025-03-07T23:31:02.013ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
297802025-03-07T23:31:02.016ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
297812025-03-07T23:31:02.016ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297822025-03-07T23:31:02.016ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297832025-03-07T23:31:02.019ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297842025-03-07T23:31:02.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
297852025-03-07T23:31:02.025ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
297862025-03-07T23:31:02.025ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297872025-03-07T23:31:02.025ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297882025-03-07T23:31:02.026ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297892025-03-07T23:31:02.029ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
297902025-03-07T23:31:02.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
297912025-03-07T23:31:02.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
297922025-03-07T23:31:02.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
297932025-03-07T23:31:02.031ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
297942025-03-07T23:31:02.049ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
297952025-03-07T23:31:02.055ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a uri = /v1/affinity-groups?project=demo-project
297962025-03-07T23:31:02.055ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
297972025-03-07T23:31:02.055ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
297982025-03-07T23:31:02.056ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
297992025-03-07T23:31:02.065ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
298002025-03-07T23:31:02.065ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
298012025-03-07T23:31:02.065ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
298022025-03-07T23:31:02.065ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
298032025-03-07T23:31:02.065ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298042025-03-07T23:31:02.065ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298052025-03-07T23:31:02.065ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298062025-03-07T23:31:02.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
298072025-03-07T23:31:02.073ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
298082025-03-07T23:31:02.073ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298092025-03-07T23:31:02.073ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298102025-03-07T23:31:02.074ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298112025-03-07T23:31:02.077ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
298122025-03-07T23:31:02.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298132025-03-07T23:31:02.077ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298142025-03-07T23:31:02.078ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298152025-03-07T23:31:02.081ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
298162025-03-07T23:31:02.081ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298172025-03-07T23:31:02.081ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298182025-03-07T23:31:02.082ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298192025-03-07T23:31:02.099ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
298202025-03-07T23:31:02.124ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298212025-03-07T23:31:02.124ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/affinity-groups?project=demo-project
298222025-03-07T23:31:02.124ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups?project=demo-project
298232025-03-07T23:31:02.124ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298242025-03-07T23:31:02.124ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298252025-03-07T23:31:02.125ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298262025-03-07T23:31:02.140ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups?project=demo-project
298272025-03-07T23:31:02.140ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298282025-03-07T23:31:02.140ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298292025-03-07T23:31:02.140ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298302025-03-07T23:31:02.145ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups?project=demo-project
298312025-03-07T23:31:02.145ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298322025-03-07T23:31:02.145ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298332025-03-07T23:31:02.145ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298342025-03-07T23:31:02.152ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups?project=demo-project
298352025-03-07T23:31:02.172ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298362025-03-07T23:31:02.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database uri = /v1/affinity-groups?project=demo-project
298372025-03-07T23:31:02.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a roles = RoleSet { roles: {} } uri = /v1/affinity-groups?project=demo-project
298382025-03-07T23:31:02.172ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a resource = Database result = Ok(()) uri = /v1/affinity-groups?project=demo-project
298392025-03-07T23:31:02.173ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
298402025-03-07T23:31:02.173ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
298412025-03-07T23:31:02.173ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
298422025-03-07T23:31:02.174ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
298432025-03-07T23:31:02.210ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
298442025-03-07T23:31:02.210ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
298452025-03-07T23:31:02.210ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 260744 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9598630-40c5-46da-b70e-dc24ba93ec9a response_code = 200 uri = /v1/affinity-groups?project=demo-project
298462025-03-07T23:31:02.211ZINFOtest_unauthorized (external client test context): client received response status = 200
298472025-03-07T23:31:02.211ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups/demo-affinity-group?project=demo-project
298482025-03-07T23:31:02.211ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
298492025-03-07T23:31:02.211ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
298502025-03-07T23:31:02.212ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298512025-03-07T23:31:02.212ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298522025-03-07T23:31:02.212ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298532025-03-07T23:31:02.212ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298542025-03-07T23:31:02.212ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298552025-03-07T23:31:02.213ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298562025-03-07T23:31:02.218ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
298572025-03-07T23:31:02.218ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
298582025-03-07T23:31:02.218ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298592025-03-07T23:31:02.218ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298602025-03-07T23:31:02.219ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298612025-03-07T23:31:02.220ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
298622025-03-07T23:31:02.221ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
298632025-03-07T23:31:02.221ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298642025-03-07T23:31:02.221ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298652025-03-07T23:31:02.221ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298662025-03-07T23:31:02.234ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
298672025-03-07T23:31:02.234ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298682025-03-07T23:31:02.234ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298692025-03-07T23:31:02.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298702025-03-07T23:31:02.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
298712025-03-07T23:31:02.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
298722025-03-07T23:31:02.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298732025-03-07T23:31:02.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298742025-03-07T23:31:02.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298752025-03-07T23:31:02.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
298762025-03-07T23:31:02.284ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
298772025-03-07T23:31:02.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298782025-03-07T23:31:02.284ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298792025-03-07T23:31:02.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298802025-03-07T23:31:02.285ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
298812025-03-07T23:31:02.310ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
298822025-03-07T23:31:02.310ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
298832025-03-07T23:31:02.310ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
298842025-03-07T23:31:02.311ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
298852025-03-07T23:31:02.323ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
298862025-03-07T23:31:02.331ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
298872025-03-07T23:31:02.332ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298882025-03-07T23:31:02.333ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298892025-03-07T23:31:02.333ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298902025-03-07T23:31:02.334ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298912025-03-07T23:31:02.360ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298922025-03-07T23:31:02.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298932025-03-07T23:31:02.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298942025-03-07T23:31:02.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298952025-03-07T23:31:02.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298962025-03-07T23:31:02.397ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298972025-03-07T23:31:02.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298982025-03-07T23:31:02.400ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
298992025-03-07T23:31:02.400ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299002025-03-07T23:31:02.400ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299012025-03-07T23:31:02.401ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299022025-03-07T23:31:02.408ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299032025-03-07T23:31:02.408ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299042025-03-07T23:31:02.408ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299052025-03-07T23:31:02.409ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299062025-03-07T23:31:02.428ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299072025-03-07T23:31:02.428ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299082025-03-07T23:31:02.428ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299092025-03-07T23:31:02.429ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299102025-03-07T23:31:02.434ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299112025-03-07T23:31:02.448ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299122025-03-07T23:31:02.448ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 236546 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 80978956-f234-431e-b9a2-72cff84441ff response_code = 200 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299132025-03-07T23:31:02.449ZINFOtest_unauthorized (external client test context): client received response status = 200
299142025-03-07T23:31:02.450ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
299152025-03-07T23:31:02.450ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
299162025-03-07T23:31:02.450ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299172025-03-07T23:31:02.450ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299182025-03-07T23:31:02.450ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299192025-03-07T23:31:02.450ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299202025-03-07T23:31:02.450ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299212025-03-07T23:31:02.454ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299222025-03-07T23:31:02.498ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299232025-03-07T23:31:02.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299242025-03-07T23:31:02.501ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299252025-03-07T23:31:02.544ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
299262025-03-07T23:31:02.544ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
299272025-03-07T23:31:02.544ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299282025-03-07T23:31:02.544ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299292025-03-07T23:31:02.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299302025-03-07T23:31:02.553ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
299312025-03-07T23:31:02.553ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299322025-03-07T23:31:02.553ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299332025-03-07T23:31:02.554ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299342025-03-07T23:31:02.558ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
299352025-03-07T23:31:02.565ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
299362025-03-07T23:31:02.565ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299372025-03-07T23:31:02.565ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299382025-03-07T23:31:02.566ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299392025-03-07T23:31:02.567ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
299402025-03-07T23:31:02.568ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
299412025-03-07T23:31:02.570ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
299422025-03-07T23:31:02.571ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
299432025-03-07T23:31:02.571ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299442025-03-07T23:31:02.571ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299452025-03-07T23:31:02.572ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299462025-03-07T23:31:02.573ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
299472025-03-07T23:31:02.573ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
299482025-03-07T23:31:02.574ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
299492025-03-07T23:31:02.574ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
299502025-03-07T23:31:02.575ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
299512025-03-07T23:31:02.575ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
299522025-03-07T23:31:02.575ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
299532025-03-07T23:31:02.576ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
299542025-03-07T23:31:02.592ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
299552025-03-07T23:31:02.596ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
299562025-03-07T23:31:02.596ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299572025-03-07T23:31:02.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299582025-03-07T23:31:02.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299592025-03-07T23:31:02.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299602025-03-07T23:31:02.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299612025-03-07T23:31:02.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299622025-03-07T23:31:02.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299632025-03-07T23:31:02.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299642025-03-07T23:31:02.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299652025-03-07T23:31:02.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299662025-03-07T23:31:02.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299672025-03-07T23:31:02.629ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299682025-03-07T23:31:02.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299692025-03-07T23:31:02.629ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299702025-03-07T23:31:02.630ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299712025-03-07T23:31:02.633ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299722025-03-07T23:31:02.634ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299732025-03-07T23:31:02.634ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299742025-03-07T23:31:02.634ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299752025-03-07T23:31:02.668ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299762025-03-07T23:31:02.668ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299772025-03-07T23:31:02.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299782025-03-07T23:31:02.669ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299792025-03-07T23:31:02.673ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299802025-03-07T23:31:02.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299812025-03-07T23:31:02.695ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 244941 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 528f2823-3291-4f8f-bb34-97606e770152 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299822025-03-07T23:31:02.696ZINFOtest_unauthorized (external client test context): client received response status = 404
299832025-03-07T23:31:02.696ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
299842025-03-07T23:31:02.696ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
299852025-03-07T23:31:02.697ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27b598ee-d5e5-4e3a-bcf4-95e151e54b94 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299862025-03-07T23:31:02.697ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27b598ee-d5e5-4e3a-bcf4-95e151e54b94 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299872025-03-07T23:31:02.697ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27b598ee-d5e5-4e3a-bcf4-95e151e54b94 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299882025-03-07T23:31:02.697ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27b598ee-d5e5-4e3a-bcf4-95e151e54b94 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299892025-03-07T23:31:02.697ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 296 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 27b598ee-d5e5-4e3a-bcf4-95e151e54b94 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299902025-03-07T23:31:02.697ZINFOtest_unauthorized (external client test context): client received response status = 401
299912025-03-07T23:31:02.697ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
299922025-03-07T23:31:02.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
299932025-03-07T23:31:02.698ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a034ef7-f1c8-4f62-8b3f-382d796b2415 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299942025-03-07T23:31:02.698ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a034ef7-f1c8-4f62-8b3f-382d796b2415 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299952025-03-07T23:31:02.698ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a034ef7-f1c8-4f62-8b3f-382d796b2415 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299962025-03-07T23:31:02.698ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 161 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6a034ef7-f1c8-4f62-8b3f-382d796b2415 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
299972025-03-07T23:31:02.698ZINFOtest_unauthorized (external client test context): client received response status = 401
299982025-03-07T23:31:02.698ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups/demo-affinity-group?project=demo-project
299992025-03-07T23:31:02.698ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300002025-03-07T23:31:02.711ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69600fbd-3c03-418e-87e8-f8f0288b52ad uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300012025-03-07T23:31:02.711ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69600fbd-3c03-418e-87e8-f8f0288b52ad uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300022025-03-07T23:31:02.713ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2555:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2574:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69600fbd-3c03-418e-87e8-f8f0288b52ad uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300032025-03-07T23:31:02.713ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1522 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 69600fbd-3c03-418e-87e8-f8f0288b52ad response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300042025-03-07T23:31:02.713ZINFOtest_unauthorized (external client test context): client received response status = 401
300052025-03-07T23:31:02.713ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
300062025-03-07T23:31:02.713ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300072025-03-07T23:31:02.713ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300082025-03-07T23:31:02.713ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300092025-03-07T23:31:02.713ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300102025-03-07T23:31:02.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300112025-03-07T23:31:02.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300122025-03-07T23:31:02.714ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300132025-03-07T23:31:02.718ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300142025-03-07T23:31:02.718ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300152025-03-07T23:31:02.719ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300162025-03-07T23:31:02.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
300172025-03-07T23:31:02.739ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
300182025-03-07T23:31:02.739ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300192025-03-07T23:31:02.739ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300202025-03-07T23:31:02.740ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300212025-03-07T23:31:02.743ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
300222025-03-07T23:31:02.743ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300232025-03-07T23:31:02.743ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300242025-03-07T23:31:02.744ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300252025-03-07T23:31:02.754ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
300262025-03-07T23:31:02.758ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
300272025-03-07T23:31:02.762ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300282025-03-07T23:31:02.763ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300292025-03-07T23:31:02.763ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300302025-03-07T23:31:02.772ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
300312025-03-07T23:31:02.772ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
300322025-03-07T23:31:02.772ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300332025-03-07T23:31:02.772ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300342025-03-07T23:31:02.773ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300352025-03-07T23:31:02.782ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
300362025-03-07T23:31:02.782ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
300372025-03-07T23:31:02.782ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
300382025-03-07T23:31:02.783ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
300392025-03-07T23:31:02.788ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
300402025-03-07T23:31:02.791ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
300412025-03-07T23:31:02.791ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300422025-03-07T23:31:02.791ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300432025-03-07T23:31:02.791ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300442025-03-07T23:31:02.792ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300452025-03-07T23:31:02.799ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300462025-03-07T23:31:02.799ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300472025-03-07T23:31:02.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300482025-03-07T23:31:02.811ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300492025-03-07T23:31:02.811ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300502025-03-07T23:31:02.812ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300512025-03-07T23:31:02.820ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300522025-03-07T23:31:02.821ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300532025-03-07T23:31:02.821ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300542025-03-07T23:31:02.821ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300552025-03-07T23:31:02.821ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300562025-03-07T23:31:02.832ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300572025-03-07T23:31:02.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300582025-03-07T23:31:02.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300592025-03-07T23:31:02.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300602025-03-07T23:31:02.841ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300612025-03-07T23:31:02.841ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300622025-03-07T23:31:02.841ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300632025-03-07T23:31:02.842ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300642025-03-07T23:31:02.863ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300652025-03-07T23:31:02.885ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300662025-03-07T23:31:02.886ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 172542 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ceb22c02-64a8-4416-8152-3bc510c58071 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300672025-03-07T23:31:02.886ZINFOtest_unauthorized (external client test context): client received response status = 404
300682025-03-07T23:31:02.887ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
300692025-03-07T23:31:02.887ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300702025-03-07T23:31:02.887ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6c505ceb-cf7a-4861-b9bd-43b22bb801bc uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300712025-03-07T23:31:02.887ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6c505ceb-cf7a-4861-b9bd-43b22bb801bc uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300722025-03-07T23:31:02.887ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6c505ceb-cf7a-4861-b9bd-43b22bb801bc uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300732025-03-07T23:31:02.887ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6c505ceb-cf7a-4861-b9bd-43b22bb801bc uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300742025-03-07T23:31:02.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 542 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6c505ceb-cf7a-4861-b9bd-43b22bb801bc response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300752025-03-07T23:31:02.888ZINFOtest_unauthorized (external client test context): client received response status = 401
300762025-03-07T23:31:02.888ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
300772025-03-07T23:31:02.888ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300782025-03-07T23:31:02.888ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae79d426-480f-4a9a-bf12-ca9419426f1a uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300792025-03-07T23:31:02.888ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae79d426-480f-4a9a-bf12-ca9419426f1a uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300802025-03-07T23:31:02.888ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae79d426-480f-4a9a-bf12-ca9419426f1a uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300812025-03-07T23:31:02.888ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 226 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ae79d426-480f-4a9a-bf12-ca9419426f1a response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300822025-03-07T23:31:02.888ZINFOtest_unauthorized (external client test context): client received response status = 401
300832025-03-07T23:31:02.889ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups/demo-affinity-group?project=demo-project
300842025-03-07T23:31:02.889ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300852025-03-07T23:31:02.889ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3418d48b-7603-4e57-b6a8-d378772d29aa uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300862025-03-07T23:31:02.889ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3418d48b-7603-4e57-b6a8-d378772d29aa uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300872025-03-07T23:31:02.890ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2795:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2815:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AffinityGroupUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3418d48b-7603-4e57-b6a8-d378772d29aa uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300882025-03-07T23:31:02.890ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1175 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3418d48b-7603-4e57-b6a8-d378772d29aa response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300892025-03-07T23:31:02.890ZINFOtest_unauthorized (external client test context): client received response status = 401
300902025-03-07T23:31:02.890ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
300912025-03-07T23:31:02.890ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300922025-03-07T23:31:02.890ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 27a20721-5923-4035-83b9-51f1799fca18 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300932025-03-07T23:31:02.890ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 27a20721-5923-4035-83b9-51f1799fca18 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300942025-03-07T23:31:02.891ZINFOtest_unauthorized (external client test context): client received response status = 405
300952025-03-07T23:31:02.891ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
300962025-03-07T23:31:02.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
300972025-03-07T23:31:02.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = baaadf22-fcc8-4e11-a274-545bfb00a296 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300982025-03-07T23:31:02.891ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = baaadf22-fcc8-4e11-a274-545bfb00a296 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
300992025-03-07T23:31:02.891ZINFOtest_unauthorized (external client test context): client received response status = 405
301002025-03-07T23:31:02.891ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301012025-03-07T23:31:02.891ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
301022025-03-07T23:31:02.891ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3759b073-0bc8-417e-94b3-19ce4a68e9bf uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301032025-03-07T23:31:02.891ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3759b073-0bc8-417e-94b3-19ce4a68e9bf response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301042025-03-07T23:31:02.892ZINFOtest_unauthorized (external client test context): client received response status = 405
301052025-03-07T23:31:02.892ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301062025-03-07T23:31:02.892ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
301072025-03-07T23:31:02.892ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c016c183-b4ec-4207-abb2-10e9c68f81a3 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301082025-03-07T23:31:02.892ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c016c183-b4ec-4207-abb2-10e9c68f81a3 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301092025-03-07T23:31:02.892ZINFOtest_unauthorized (external client test context): client received response status = 405
301102025-03-07T23:31:02.892ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301112025-03-07T23:31:02.892ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
301122025-03-07T23:31:02.892ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301132025-03-07T23:31:02.892ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301142025-03-07T23:31:02.892ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301152025-03-07T23:31:02.893ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301162025-03-07T23:31:02.893ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301172025-03-07T23:31:02.893ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301182025-03-07T23:31:02.902ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301192025-03-07T23:31:02.902ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301202025-03-07T23:31:02.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301212025-03-07T23:31:02.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
301222025-03-07T23:31:02.915ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
301232025-03-07T23:31:02.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301242025-03-07T23:31:02.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301252025-03-07T23:31:02.916ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301262025-03-07T23:31:02.928ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
301272025-03-07T23:31:02.928ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301282025-03-07T23:31:02.928ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301292025-03-07T23:31:02.929ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301302025-03-07T23:31:02.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
301312025-03-07T23:31:02.950ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
301322025-03-07T23:31:02.950ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301332025-03-07T23:31:02.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301342025-03-07T23:31:02.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301352025-03-07T23:31:02.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
301362025-03-07T23:31:02.954ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
301372025-03-07T23:31:02.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301382025-03-07T23:31:02.954ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301392025-03-07T23:31:02.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301402025-03-07T23:31:02.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
301412025-03-07T23:31:02.977ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
301422025-03-07T23:31:02.977ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
301432025-03-07T23:31:02.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
301442025-03-07T23:31:03.006ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
301452025-03-07T23:31:03.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
301462025-03-07T23:31:03.009ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301472025-03-07T23:31:03.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301482025-03-07T23:31:03.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301492025-03-07T23:31:03.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301502025-03-07T23:31:03.028ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301512025-03-07T23:31:03.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301522025-03-07T23:31:03.029ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301532025-03-07T23:31:03.031ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301542025-03-07T23:31:03.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301552025-03-07T23:31:03.032ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301562025-03-07T23:31:03.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301572025-03-07T23:31:03.034ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301582025-03-07T23:31:03.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301592025-03-07T23:31:03.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301602025-03-07T23:31:03.035ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301612025-03-07T23:31:03.038ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301622025-03-07T23:31:03.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301632025-03-07T23:31:03.038ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301642025-03-07T23:31:03.039ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301652025-03-07T23:31:03.042ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301662025-03-07T23:31:03.042ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301672025-03-07T23:31:03.042ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301682025-03-07T23:31:03.042ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301692025-03-07T23:31:03.045ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301702025-03-07T23:31:03.065ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301712025-03-07T23:31:03.065ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 172955 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b68b6b69-8c66-4a50-a7d7-9452433c9d8a response_code = 404 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301722025-03-07T23:31:03.066ZINFOtest_unauthorized (external client test context): client received response status = 404
301732025-03-07T23:31:03.066ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301742025-03-07T23:31:03.066ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
301752025-03-07T23:31:03.066ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c9f2833-8052-4d59-8771-c366fd4263f0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301762025-03-07T23:31:03.066ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
301772025-03-07T23:31:03.066ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
301782025-03-07T23:31:03.066ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
301792025-03-07T23:31:03.067ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c9f2833-8052-4d59-8771-c366fd4263f0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301802025-03-07T23:31:03.067ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c9f2833-8052-4d59-8771-c366fd4263f0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301812025-03-07T23:31:03.067ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c9f2833-8052-4d59-8771-c366fd4263f0 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301822025-03-07T23:31:03.067ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 635 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c9f2833-8052-4d59-8771-c366fd4263f0 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301832025-03-07T23:31:03.067ZINFOtest_unauthorized (external client test context): client received response status = 401
301842025-03-07T23:31:03.067ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301852025-03-07T23:31:03.067ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
301862025-03-07T23:31:03.067ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 548d9613-f013-4e6e-b8af-a717cd24e492 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301872025-03-07T23:31:03.068ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 548d9613-f013-4e6e-b8af-a717cd24e492 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301882025-03-07T23:31:03.068ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 548d9613-f013-4e6e-b8af-a717cd24e492 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301892025-03-07T23:31:03.068ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 449 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 548d9613-f013-4e6e-b8af-a717cd24e492 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301902025-03-07T23:31:03.068ZINFOtest_unauthorized (external client test context): client received response status = 401
301912025-03-07T23:31:03.068ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301922025-03-07T23:31:03.068ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
301932025-03-07T23:31:03.069ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f84fd18b-b308-4448-9ceb-fb13a0c5f696 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301942025-03-07T23:31:03.069ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f84fd18b-b308-4448-9ceb-fb13a0c5f696 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301952025-03-07T23:31:03.070ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2826:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2843:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f84fd18b-b308-4448-9ceb-fb13a0c5f696 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301962025-03-07T23:31:03.070ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1007 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f84fd18b-b308-4448-9ceb-fb13a0c5f696 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
301972025-03-07T23:31:03.070ZINFOtest_unauthorized (external client test context): client received response status = 401
301982025-03-07T23:31:03.070ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
301992025-03-07T23:31:03.070ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
302002025-03-07T23:31:03.070ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c20bb40c-779e-4787-b3d6-19d9e52054c7 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302012025-03-07T23:31:03.070ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c20bb40c-779e-4787-b3d6-19d9e52054c7 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302022025-03-07T23:31:03.070ZINFOtest_unauthorized (external client test context): client received response status = 405
302032025-03-07T23:31:03.070ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
302042025-03-07T23:31:03.070ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
302052025-03-07T23:31:03.071ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f481d2cb-320b-4daf-be15-b7a591a2fb47 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302062025-03-07T23:31:03.071ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f481d2cb-320b-4daf-be15-b7a591a2fb47 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302072025-03-07T23:31:03.071ZINFOtest_unauthorized (external client test context): client received response status = 405
302082025-03-07T23:31:03.071ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
302092025-03-07T23:31:03.071ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
302102025-03-07T23:31:03.071ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = efa8de14-abe6-4675-9869-1e48015f5488 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302112025-03-07T23:31:03.071ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = efa8de14-abe6-4675-9869-1e48015f5488 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302122025-03-07T23:31:03.072ZINFOtest_unauthorized (external client test context): client received response status = 405
302132025-03-07T23:31:03.072ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups/demo-affinity-group?project=demo-project
302142025-03-07T23:31:03.072ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
302152025-03-07T23:31:03.074ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0634826a-00b5-4103-aaaf-b6b886e86e6b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302162025-03-07T23:31:03.074ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0634826a-00b5-4103-aaaf-b6b886e86e6b response_code = 405 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302172025-03-07T23:31:03.074ZINFOtest_unauthorized (external client test context): client received response status = 405
302182025-03-07T23:31:03.074ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups/demo-affinity-group?project=demo-project
302192025-03-07T23:31:03.074ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group?project=demo-project
302202025-03-07T23:31:03.074ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302212025-03-07T23:31:03.074ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302222025-03-07T23:31:03.074ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302232025-03-07T23:31:03.074ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302242025-03-07T23:31:03.074ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302252025-03-07T23:31:03.076ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302262025-03-07T23:31:03.090ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302272025-03-07T23:31:03.096ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302282025-03-07T23:31:03.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302292025-03-07T23:31:03.101ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
302302025-03-07T23:31:03.102ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
302312025-03-07T23:31:03.102ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302322025-03-07T23:31:03.102ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302332025-03-07T23:31:03.102ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302342025-03-07T23:31:03.121ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
302352025-03-07T23:31:03.121ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302362025-03-07T23:31:03.121ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302372025-03-07T23:31:03.122ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302382025-03-07T23:31:03.124ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
302392025-03-07T23:31:03.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
302402025-03-07T23:31:03.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302412025-03-07T23:31:03.128ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302422025-03-07T23:31:03.128ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302432025-03-07T23:31:03.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
302442025-03-07T23:31:03.135ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
302452025-03-07T23:31:03.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302462025-03-07T23:31:03.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302472025-03-07T23:31:03.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302482025-03-07T23:31:03.138ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
302492025-03-07T23:31:03.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302502025-03-07T23:31:03.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302512025-03-07T23:31:03.139ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302522025-03-07T23:31:03.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
302532025-03-07T23:31:03.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
302542025-03-07T23:31:03.151ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302552025-03-07T23:31:03.151ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302562025-03-07T23:31:03.151ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302572025-03-07T23:31:03.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302582025-03-07T23:31:03.160ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
302592025-03-07T23:31:03.160ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
302602025-03-07T23:31:03.161ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
302612025-03-07T23:31:03.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
302622025-03-07T23:31:03.167ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302632025-03-07T23:31:03.167ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302642025-03-07T23:31:03.168ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302652025-03-07T23:31:03.169ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
302662025-03-07T23:31:03.169ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
302672025-03-07T23:31:03.172ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
302682025-03-07T23:31:03.172ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
302692025-03-07T23:31:03.185ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302702025-03-07T23:31:03.185ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302712025-03-07T23:31:03.188ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302722025-03-07T23:31:03.196ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302732025-03-07T23:31:03.196ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302742025-03-07T23:31:03.196ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302752025-03-07T23:31:03.196ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302762025-03-07T23:31:03.197ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302772025-03-07T23:31:03.201ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302782025-03-07T23:31:03.201ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302792025-03-07T23:31:03.201ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302802025-03-07T23:31:03.202ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302812025-03-07T23:31:03.208ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302822025-03-07T23:31:03.208ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302832025-03-07T23:31:03.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302842025-03-07T23:31:03.209ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302852025-03-07T23:31:03.212ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302862025-03-07T23:31:03.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302872025-03-07T23:31:03.221ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 146733 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 620b47c5-1d9c-49ed-b97b-b8cc89f8c91b response_code = 200 uri = /v1/affinity-groups/demo-affinity-group?project=demo-project
302882025-03-07T23:31:03.222ZINFOtest_unauthorized (external client test context): client received response status = 200
302892025-03-07T23:31:03.222ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
302902025-03-07T23:31:03.222ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
302912025-03-07T23:31:03.222ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
302922025-03-07T23:31:03.222ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
302932025-03-07T23:31:03.223ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
302942025-03-07T23:31:03.223ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
302952025-03-07T23:31:03.223ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302962025-03-07T23:31:03.223ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
302972025-03-07T23:31:03.223ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
302982025-03-07T23:31:03.229ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
302992025-03-07T23:31:03.229ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303002025-03-07T23:31:03.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303012025-03-07T23:31:03.231ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
303022025-03-07T23:31:03.231ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
303032025-03-07T23:31:03.232ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303042025-03-07T23:31:03.232ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303052025-03-07T23:31:03.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303062025-03-07T23:31:03.248ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
303072025-03-07T23:31:03.294ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303082025-03-07T23:31:03.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303092025-03-07T23:31:03.317ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303102025-03-07T23:31:03.333ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
303112025-03-07T23:31:03.335ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
303122025-03-07T23:31:03.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
303132025-03-07T23:31:03.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303142025-03-07T23:31:03.339ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303152025-03-07T23:31:03.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303162025-03-07T23:31:03.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
303172025-03-07T23:31:03.397ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
303182025-03-07T23:31:03.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303192025-03-07T23:31:03.397ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303202025-03-07T23:31:03.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303212025-03-07T23:31:03.408ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
303222025-03-07T23:31:03.434ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
303232025-03-07T23:31:03.435ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
303242025-03-07T23:31:03.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
303252025-03-07T23:31:03.438ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:39436 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303262025-03-07T23:31:03.438ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:59428 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303272025-03-07T23:31:03.438ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:59503 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303282025-03-07T23:31:03.438ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:37758 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303292025-03-07T23:31:03.439ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
303302025-03-07T23:31:03.440ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
303312025-03-07T23:31:03.440ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
303322025-03-07T23:31:03.446ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
303332025-03-07T23:31:03.447ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303342025-03-07T23:31:03.447ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303352025-03-07T23:31:03.447ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303362025-03-07T23:31:03.448ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303372025-03-07T23:31:03.448ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:34193 remote_addr = 127.0.0.1:57373
303382025-03-07T23:31:03.448ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:35447 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303392025-03-07T23:31:03.448ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:35041 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303402025-03-07T23:31:03.449ZINFOtest_unauthorized (dropshot): accepted connection kind = pantry local_addr = [::1]:37181 remote_addr = [::1]:60956 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
303412025-03-07T23:31:03.449ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:39436 req_id = 7eef305a-cb74-475a-8575-9aec258f7b1c sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303422025-03-07T23:31:03.449ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:59428 req_id = 59b0e317-11cb-4759-99a9-3c35618c05bf sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303432025-03-07T23:31:03.449ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:59503 req_id = e3ede5bf-82c0-47da-bf1a-0a046f99a047 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303442025-03-07T23:31:03.450ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:37758 req_id = 4a92b410-4709-4f7d-904e-b5ed3a5053e9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303452025-03-07T23:31:03.450ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1352 local_addr = [::1]:37181 method = GET remote_addr = [::1]:39436 req_id = 7eef305a-cb74-475a-8575-9aec258f7b1c response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303462025-03-07T23:31:03.450ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1217 local_addr = [::1]:37181 method = GET remote_addr = [::1]:59428 req_id = 59b0e317-11cb-4759-99a9-3c35618c05bf response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303472025-03-07T23:31:03.451ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1131 local_addr = [::1]:37181 method = GET remote_addr = [::1]:59503 req_id = e3ede5bf-82c0-47da-bf1a-0a046f99a047 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303482025-03-07T23:31:03.451ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 1093 local_addr = [::1]:37181 method = GET remote_addr = [::1]:37758 req_id = 4a92b410-4709-4f7d-904e-b5ed3a5053e9 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303492025-03-07T23:31:03.452ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 085bfc44-f8a9-4727-86b7-add1c59ef1d4 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
303502025-03-07T23:31:03.452ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:35447 req_id = fe094bf0-cd3e-473e-8a6c-4b661921f592 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303512025-03-07T23:31:03.452ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:35041 req_id = c28c122f-eab3-4942-8d21-bd8ad74cc61a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303522025-03-07T23:31:03.452ZTRACtest_unauthorized (dropshot): incoming request kind = pantry local_addr = [::1]:37181 method = GET remote_addr = [::1]:60956 req_id = 1d8b2867-29e0-40fa-8d95-c34c61ec0eb9 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303532025-03-07T23:31:03.453ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 085bfc44-f8a9-4727-86b7-add1c59ef1d4 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
303542025-03-07T23:31:03.454ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 085bfc44-f8a9-4727-86b7-add1c59ef1d4 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
303552025-03-07T23:31:03.454ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 085bfc44-f8a9-4727-86b7-add1c59ef1d4 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
303562025-03-07T23:31:03.455ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2788 local_addr = [::1]:37181 method = GET remote_addr = [::1]:35447 req_id = fe094bf0-cd3e-473e-8a6c-4b661921f592 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303572025-03-07T23:31:03.455ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2842 local_addr = [::1]:37181 method = GET remote_addr = [::1]:35041 req_id = c28c122f-eab3-4942-8d21-bd8ad74cc61a response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303582025-03-07T23:31:03.455ZINFOtest_unauthorized (dropshot): request completed kind = pantry latency_us = 2756 local_addr = [::1]:37181 method = GET remote_addr = [::1]:60956 req_id = 1d8b2867-29e0-40fa-8d95-c34c61ec0eb9 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
303592025-03-07T23:31:03.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303602025-03-07T23:31:03.456ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303612025-03-07T23:31:03.456ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303622025-03-07T23:31:03.460ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 8645 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 085bfc44-f8a9-4727-86b7-add1c59ef1d4 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
303632025-03-07T23:31:03.461ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303642025-03-07T23:31:03.461ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303652025-03-07T23:31:03.462ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303662025-03-07T23:31:03.463ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "085bfc44-f8a9-4727-86b7-add1c59ef1d4", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:02 GMT"} })
303672025-03-07T23:31:03.464ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
303682025-03-07T23:31:03.464ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 19233004-715a-48fa-8d27-b5c27a67a232 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
303692025-03-07T23:31:03.464ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 19233004-715a-48fa-8d27-b5c27a67a232 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
303702025-03-07T23:31:03.464ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 19233004-715a-48fa-8d27-b5c27a67a232 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
303712025-03-07T23:31:03.465ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 19233004-715a-48fa-8d27-b5c27a67a232 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
303722025-03-07T23:31:03.466ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303732025-03-07T23:31:03.466ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303742025-03-07T23:31:03.467ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303752025-03-07T23:31:03.467ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303762025-03-07T23:31:03.467ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303772025-03-07T23:31:03.470ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 6306 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 19233004-715a-48fa-8d27-b5c27a67a232 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
303782025-03-07T23:31:03.471ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "19233004-715a-48fa-8d27-b5c27a67a232", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:02 GMT"} })
303792025-03-07T23:31:03.471ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
303802025-03-07T23:31:03.472ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
303812025-03-07T23:31:03.472ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
303822025-03-07T23:31:03.487ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303832025-03-07T23:31:03.489ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303842025-03-07T23:31:03.489ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303852025-03-07T23:31:03.491ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303862025-03-07T23:31:03.508ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303872025-03-07T23:31:03.508ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303882025-03-07T23:31:03.508ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303892025-03-07T23:31:03.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303902025-03-07T23:31:03.528ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303912025-03-07T23:31:03.537ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303922025-03-07T23:31:03.538ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303932025-03-07T23:31:03.538ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303942025-03-07T23:31:03.538ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303952025-03-07T23:31:03.538ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303962025-03-07T23:31:03.538ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303972025-03-07T23:31:03.545ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303982025-03-07T23:31:03.545ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
303992025-03-07T23:31:03.545ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304002025-03-07T23:31:03.546ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304012025-03-07T23:31:03.553ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304022025-03-07T23:31:03.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304032025-03-07T23:31:03.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304042025-03-07T23:31:03.553ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304052025-03-07T23:31:03.565ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304062025-03-07T23:31:03.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304072025-03-07T23:31:03.565ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304082025-03-07T23:31:03.574ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304092025-03-07T23:31:03.574ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304102025-03-07T23:31:03.574ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304112025-03-07T23:31:03.575ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304122025-03-07T23:31:03.577ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304132025-03-07T23:31:03.580ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304142025-03-07T23:31:03.580ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304152025-03-07T23:31:03.580ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
304162025-03-07T23:31:03.583ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 360924 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4d338598-610c-4cf7-90d5-9ba01c4c410b response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304172025-03-07T23:31:03.584ZINFOtest_unauthorized (external client test context): client received response status = 200
304182025-03-07T23:31:03.584ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304192025-03-07T23:31:03.584ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
304202025-03-07T23:31:03.584ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304212025-03-07T23:31:03.585ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304222025-03-07T23:31:03.585ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304232025-03-07T23:31:03.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304242025-03-07T23:31:03.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304252025-03-07T23:31:03.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304262025-03-07T23:31:03.592ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304272025-03-07T23:31:03.593ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304282025-03-07T23:31:03.593ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304292025-03-07T23:31:03.619ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
304302025-03-07T23:31:03.619ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
304312025-03-07T23:31:03.619ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304322025-03-07T23:31:03.619ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304332025-03-07T23:31:03.620ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304342025-03-07T23:31:03.625ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
304352025-03-07T23:31:03.626ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304362025-03-07T23:31:03.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304372025-03-07T23:31:03.627ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304382025-03-07T23:31:03.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
304392025-03-07T23:31:03.642ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
304402025-03-07T23:31:03.642ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304412025-03-07T23:31:03.642ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304422025-03-07T23:31:03.643ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304432025-03-07T23:31:03.645ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
304442025-03-07T23:31:03.645ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
304452025-03-07T23:31:03.645ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304462025-03-07T23:31:03.645ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304472025-03-07T23:31:03.646ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304482025-03-07T23:31:03.653ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
304492025-03-07T23:31:03.653ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
304502025-03-07T23:31:03.653ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
304512025-03-07T23:31:03.654ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
304522025-03-07T23:31:03.661ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
304532025-03-07T23:31:03.665ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
304542025-03-07T23:31:03.665ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304552025-03-07T23:31:03.665ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304562025-03-07T23:31:03.665ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304572025-03-07T23:31:03.666ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304582025-03-07T23:31:03.668ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304592025-03-07T23:31:03.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304602025-03-07T23:31:03.670ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304612025-03-07T23:31:03.674ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304622025-03-07T23:31:03.674ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304632025-03-07T23:31:03.674ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304642025-03-07T23:31:03.678ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304652025-03-07T23:31:03.678ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304662025-03-07T23:31:03.678ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304672025-03-07T23:31:03.678ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304682025-03-07T23:31:03.678ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304692025-03-07T23:31:03.694ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304702025-03-07T23:31:03.695ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304712025-03-07T23:31:03.695ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304722025-03-07T23:31:03.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304732025-03-07T23:31:03.699ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304742025-03-07T23:31:03.699ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304752025-03-07T23:31:03.699ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304762025-03-07T23:31:03.700ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304772025-03-07T23:31:03.715ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304782025-03-07T23:31:03.743ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304792025-03-07T23:31:03.743ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 158603 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f8d88d81-bb9f-476e-ae28-d62dd8bfd6f4 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304802025-03-07T23:31:03.745ZINFOtest_unauthorized (external client test context): client received response status = 404
304812025-03-07T23:31:03.745ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304822025-03-07T23:31:03.745ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
304832025-03-07T23:31:03.745ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2095b8b-1f8d-430a-ab92-c0d8bf4e235e uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304842025-03-07T23:31:03.746ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2095b8b-1f8d-430a-ab92-c0d8bf4e235e uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304852025-03-07T23:31:03.746ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2095b8b-1f8d-430a-ab92-c0d8bf4e235e uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304862025-03-07T23:31:03.746ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2095b8b-1f8d-430a-ab92-c0d8bf4e235e uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304872025-03-07T23:31:03.746ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 570 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a2095b8b-1f8d-430a-ab92-c0d8bf4e235e response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304882025-03-07T23:31:03.747ZINFOtest_unauthorized (external client test context): client received response status = 401
304892025-03-07T23:31:03.747ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304902025-03-07T23:31:03.747ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
304912025-03-07T23:31:03.752ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f301e80b-3e1c-4e78-a6c6-c3c76599b11d uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304922025-03-07T23:31:03.752ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f301e80b-3e1c-4e78-a6c6-c3c76599b11d uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304932025-03-07T23:31:03.752ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f301e80b-3e1c-4e78-a6c6-c3c76599b11d uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304942025-03-07T23:31:03.752ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 435 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f301e80b-3e1c-4e78-a6c6-c3c76599b11d response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304952025-03-07T23:31:03.759ZINFOtest_unauthorized (external client test context): client received response status = 401
304962025-03-07T23:31:03.759ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304972025-03-07T23:31:03.759ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
304982025-03-07T23:31:03.760ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5636504c-3c4d-4c65-9d53-54cd1eeab28f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
304992025-03-07T23:31:03.761ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5636504c-3c4d-4c65-9d53-54cd1eeab28f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305002025-03-07T23:31:03.763ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2588:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AffinityGroupMember>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2619:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AffinityGroupMember>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityGroupPath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AffinityGroupMember>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5636504c-3c4d-4c65-9d53-54cd1eeab28f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305012025-03-07T23:31:03.763ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2757 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5636504c-3c4d-4c65-9d53-54cd1eeab28f response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305022025-03-07T23:31:03.763ZINFOtest_unauthorized (external client test context): client received response status = 401
305032025-03-07T23:31:03.763ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305042025-03-07T23:31:03.763ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305052025-03-07T23:31:03.770ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17de697c-0e6a-4294-8ff5-eb0cdcef8c8f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305062025-03-07T23:31:03.770ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 106 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 17de697c-0e6a-4294-8ff5-eb0cdcef8c8f response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305072025-03-07T23:31:03.776ZINFOtest_unauthorized (external client test context): client received response status = 405
305082025-03-07T23:31:03.776ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305092025-03-07T23:31:03.777ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305102025-03-07T23:31:03.796ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 997b7555-1d16-492b-bce0-2bcc7411d3cf uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305112025-03-07T23:31:03.801ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 22191 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 997b7555-1d16-492b-bce0-2bcc7411d3cf response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305122025-03-07T23:31:03.803ZINFOtest_unauthorized (external client test context): client received response status = 405
305132025-03-07T23:31:03.803ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305142025-03-07T23:31:03.803ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305152025-03-07T23:31:03.806ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a1e466f7-0fb0-418d-979b-aeb2d8c400a2 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305162025-03-07T23:31:03.806ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 97 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a1e466f7-0fb0-418d-979b-aeb2d8c400a2 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305172025-03-07T23:31:03.813ZINFOtest_unauthorized (external client test context): client received response status = 405
305182025-03-07T23:31:03.813ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305192025-03-07T23:31:03.813ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305202025-03-07T23:31:03.814ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e531141c-c3fd-448e-b434-11e1d10c2101 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305212025-03-07T23:31:03.814ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 89 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e531141c-c3fd-448e-b434-11e1d10c2101 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305222025-03-07T23:31:03.814ZINFOtest_unauthorized (external client test context): client received response status = 405
305232025-03-07T23:31:03.814ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305242025-03-07T23:31:03.814ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305252025-03-07T23:31:03.815ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = eb551990-f6b6-44e4-bc87-9bf171ae0ea7 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305262025-03-07T23:31:03.815ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = eb551990-f6b6-44e4-bc87-9bf171ae0ea7 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305272025-03-07T23:31:03.815ZINFOtest_unauthorized (external client test context): client received response status = 405
305282025-03-07T23:31:03.815ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305292025-03-07T23:31:03.815ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305302025-03-07T23:31:03.815ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41d05243-6bbf-4cb3-bea8-05b2f0c0da27 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305312025-03-07T23:31:03.815ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 41d05243-6bbf-4cb3-bea8-05b2f0c0da27 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305322025-03-07T23:31:03.815ZINFOtest_unauthorized (external client test context): client received response status = 405
305332025-03-07T23:31:03.816ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305342025-03-07T23:31:03.816ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305352025-03-07T23:31:03.816ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 83ea061b-abea-4e17-8127-b84300c390a5 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305362025-03-07T23:31:03.816ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 83ea061b-abea-4e17-8127-b84300c390a5 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305372025-03-07T23:31:03.816ZINFOtest_unauthorized (external client test context): client received response status = 405
305382025-03-07T23:31:03.816ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305392025-03-07T23:31:03.816ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305402025-03-07T23:31:03.818ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d3e9d2e-d522-4faf-818d-dbff085cad1b uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305412025-03-07T23:31:03.818ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6d3e9d2e-d522-4faf-818d-dbff085cad1b response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305422025-03-07T23:31:03.818ZINFOtest_unauthorized (external client test context): client received response status = 405
305432025-03-07T23:31:03.818ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305442025-03-07T23:31:03.818ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305452025-03-07T23:31:03.819ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4423d5a-932e-404d-866b-7bd6040f8d11 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305462025-03-07T23:31:03.819ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4423d5a-932e-404d-866b-7bd6040f8d11 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305472025-03-07T23:31:03.819ZINFOtest_unauthorized (external client test context): client received response status = 405
305482025-03-07T23:31:03.819ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305492025-03-07T23:31:03.819ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305502025-03-07T23:31:03.819ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a84cae7a-11e5-4e21-979e-6d7509591f90 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305512025-03-07T23:31:03.819ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a84cae7a-11e5-4e21-979e-6d7509591f90 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305522025-03-07T23:31:03.819ZINFOtest_unauthorized (external client test context): client received response status = 405
305532025-03-07T23:31:03.820ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305542025-03-07T23:31:03.820ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305552025-03-07T23:31:03.820ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c16b6de4-f60e-4204-84a6-d806506831ea uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305562025-03-07T23:31:03.820ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 189 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c16b6de4-f60e-4204-84a6-d806506831ea response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305572025-03-07T23:31:03.820ZINFOtest_unauthorized (external client test context): client received response status = 405
305582025-03-07T23:31:03.820ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305592025-03-07T23:31:03.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305602025-03-07T23:31:03.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 105eb882-2fe7-439e-b7d0-00d388fd0429 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305612025-03-07T23:31:03.821ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 105eb882-2fe7-439e-b7d0-00d388fd0429 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305622025-03-07T23:31:03.821ZINFOtest_unauthorized (external client test context): client received response status = 405
305632025-03-07T23:31:03.821ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305642025-03-07T23:31:03.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305652025-03-07T23:31:03.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dd4b920c-fbeb-44da-a888-6d7257efe41b uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305662025-03-07T23:31:03.821ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dd4b920c-fbeb-44da-a888-6d7257efe41b response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305672025-03-07T23:31:03.821ZINFOtest_unauthorized (external client test context): client received response status = 405
305682025-03-07T23:31:03.821ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305692025-03-07T23:31:03.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305702025-03-07T23:31:03.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 18e6f06b-2694-4448-8c15-177a6b72eb58 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305712025-03-07T23:31:03.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 18e6f06b-2694-4448-8c15-177a6b72eb58 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305722025-03-07T23:31:03.822ZINFOtest_unauthorized (external client test context): client received response status = 405
305732025-03-07T23:31:03.822ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305742025-03-07T23:31:03.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305752025-03-07T23:31:03.822ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0b0367b1-9a50-44ff-8c4e-99f10ff8647d uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305762025-03-07T23:31:03.822ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0b0367b1-9a50-44ff-8c4e-99f10ff8647d response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305772025-03-07T23:31:03.822ZINFOtest_unauthorized (external client test context): client received response status = 405
305782025-03-07T23:31:03.822ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305792025-03-07T23:31:03.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305802025-03-07T23:31:03.823ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 592053d7-54a4-42bd-8389-aa28e33fdcfd uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305812025-03-07T23:31:03.823ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 592053d7-54a4-42bd-8389-aa28e33fdcfd response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305822025-03-07T23:31:03.823ZINFOtest_unauthorized (external client test context): client received response status = 405
305832025-03-07T23:31:03.823ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305842025-03-07T23:31:03.823ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members?project=demo-project
305852025-03-07T23:31:03.823ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305862025-03-07T23:31:03.823ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305872025-03-07T23:31:03.823ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
305882025-03-07T23:31:03.823ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305892025-03-07T23:31:03.823ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305902025-03-07T23:31:03.824ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305912025-03-07T23:31:03.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305922025-03-07T23:31:03.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305932025-03-07T23:31:03.830ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305942025-03-07T23:31:03.834ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
305952025-03-07T23:31:03.834ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
305962025-03-07T23:31:03.834ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
305972025-03-07T23:31:03.834ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
305982025-03-07T23:31:03.835ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
305992025-03-07T23:31:03.839ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
306002025-03-07T23:31:03.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306012025-03-07T23:31:03.839ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306022025-03-07T23:31:03.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306032025-03-07T23:31:03.848ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
306042025-03-07T23:31:03.854ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
306052025-03-07T23:31:03.854ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306062025-03-07T23:31:03.854ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306072025-03-07T23:31:03.854ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306082025-03-07T23:31:03.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
306092025-03-07T23:31:03.885ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
306102025-03-07T23:31:03.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306112025-03-07T23:31:03.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306122025-03-07T23:31:03.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306132025-03-07T23:31:03.915ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
306142025-03-07T23:31:03.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306152025-03-07T23:31:03.915ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306162025-03-07T23:31:03.915ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306172025-03-07T23:31:03.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
306182025-03-07T23:31:03.935ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
306192025-03-07T23:31:03.935ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306202025-03-07T23:31:03.935ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306212025-03-07T23:31:03.935ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306222025-03-07T23:31:03.935ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306232025-03-07T23:31:03.952ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306242025-03-07T23:31:03.952ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306252025-03-07T23:31:03.952ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306262025-03-07T23:31:03.957ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306272025-03-07T23:31:03.957ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306282025-03-07T23:31:03.957ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306292025-03-07T23:31:03.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306302025-03-07T23:31:03.990ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306312025-03-07T23:31:03.990ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306322025-03-07T23:31:03.991ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306332025-03-07T23:31:03.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306342025-03-07T23:31:04.007ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306352025-03-07T23:31:04.007ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306362025-03-07T23:31:04.007ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306372025-03-07T23:31:04.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306382025-03-07T23:31:04.014ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306392025-03-07T23:31:04.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306402025-03-07T23:31:04.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306412025-03-07T23:31:04.015ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306422025-03-07T23:31:04.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306432025-03-07T23:31:04.040ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306442025-03-07T23:31:04.040ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306452025-03-07T23:31:04.040ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306462025-03-07T23:31:04.040ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306472025-03-07T23:31:04.040ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306482025-03-07T23:31:04.040ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306492025-03-07T23:31:04.044ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306502025-03-07T23:31:04.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306512025-03-07T23:31:04.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306522025-03-07T23:31:04.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306532025-03-07T23:31:04.048ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306542025-03-07T23:31:04.048ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306552025-03-07T23:31:04.048ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306562025-03-07T23:31:04.049ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306572025-03-07T23:31:04.058ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306582025-03-07T23:31:04.066ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306592025-03-07T23:31:04.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306602025-03-07T23:31:04.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306612025-03-07T23:31:04.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306622025-03-07T23:31:04.068ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
306632025-03-07T23:31:04.068ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
306642025-03-07T23:31:04.068ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
306652025-03-07T23:31:04.068ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
306662025-03-07T23:31:04.068ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
306672025-03-07T23:31:04.068ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
306682025-03-07T23:31:04.072ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 249122 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3c9014df-68ca-4724-87c2-71340e29299f response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members?project=demo-project
306692025-03-07T23:31:04.073ZINFOtest_unauthorized (external client test context): client received response status = 200
306702025-03-07T23:31:04.073ZINFOtest_unauthorized: test: begin endpoint url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
306712025-03-07T23:31:04.073ZINFOtest_unauthorized: test: privileged GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
306722025-03-07T23:31:04.073ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
306732025-03-07T23:31:04.073ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
306742025-03-07T23:31:04.073ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
306752025-03-07T23:31:04.074ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
306762025-03-07T23:31:04.074ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306772025-03-07T23:31:04.074ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306782025-03-07T23:31:04.075ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306792025-03-07T23:31:04.078ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306802025-03-07T23:31:04.078ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306812025-03-07T23:31:04.079ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306822025-03-07T23:31:04.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
306832025-03-07T23:31:04.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
306842025-03-07T23:31:04.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306852025-03-07T23:31:04.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306862025-03-07T23:31:04.083ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306872025-03-07T23:31:04.084ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
306882025-03-07T23:31:04.084ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306892025-03-07T23:31:04.084ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306902025-03-07T23:31:04.085ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306912025-03-07T23:31:04.088ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
306922025-03-07T23:31:04.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
306932025-03-07T23:31:04.091ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306942025-03-07T23:31:04.091ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
306952025-03-07T23:31:04.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
306962025-03-07T23:31:04.094ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
306972025-03-07T23:31:04.094ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
306982025-03-07T23:31:04.094ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
306992025-03-07T23:31:04.094ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307002025-03-07T23:31:04.094ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307012025-03-07T23:31:04.096ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
307022025-03-07T23:31:04.096ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307032025-03-07T23:31:04.096ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307042025-03-07T23:31:04.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307052025-03-07T23:31:04.099ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
307062025-03-07T23:31:04.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
307072025-03-07T23:31:04.104ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307082025-03-07T23:31:04.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307092025-03-07T23:31:04.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307102025-03-07T23:31:04.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307112025-03-07T23:31:04.118ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307122025-03-07T23:31:04.118ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307132025-03-07T23:31:04.119ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307142025-03-07T23:31:04.123ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307152025-03-07T23:31:04.123ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307162025-03-07T23:31:04.125ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307172025-03-07T23:31:04.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307182025-03-07T23:31:04.130ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307192025-03-07T23:31:04.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307202025-03-07T23:31:04.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307212025-03-07T23:31:04.131ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307222025-03-07T23:31:04.135ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307232025-03-07T23:31:04.135ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307242025-03-07T23:31:04.135ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307252025-03-07T23:31:04.136ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307262025-03-07T23:31:04.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
307272025-03-07T23:31:04.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
307282025-03-07T23:31:04.156ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
307292025-03-07T23:31:04.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
307302025-03-07T23:31:04.158ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307312025-03-07T23:31:04.158ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307322025-03-07T23:31:04.158ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307332025-03-07T23:31:04.159ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307342025-03-07T23:31:04.162ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
307352025-03-07T23:31:04.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
307362025-03-07T23:31:04.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307372025-03-07T23:31:04.176ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307382025-03-07T23:31:04.176ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307392025-03-07T23:31:04.176ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307402025-03-07T23:31:04.176ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307412025-03-07T23:31:04.177ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
307422025-03-07T23:31:04.177ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
307432025-03-07T23:31:04.180ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307442025-03-07T23:31:04.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307452025-03-07T23:31:04.181ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307462025-03-07T23:31:04.183ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307472025-03-07T23:31:04.183ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307482025-03-07T23:31:04.183ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307492025-03-07T23:31:04.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307502025-03-07T23:31:04.186ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307512025-03-07T23:31:04.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307522025-03-07T23:31:04.186ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307532025-03-07T23:31:04.186ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307542025-03-07T23:31:04.193ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307552025-03-07T23:31:04.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307562025-03-07T23:31:04.194ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307572025-03-07T23:31:04.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307582025-03-07T23:31:04.203ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307592025-03-07T23:31:04.204ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307602025-03-07T23:31:04.204ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307612025-03-07T23:31:04.205ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307622025-03-07T23:31:04.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307632025-03-07T23:31:04.225ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307642025-03-07T23:31:04.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307652025-03-07T23:31:04.225ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307662025-03-07T23:31:04.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307672025-03-07T23:31:04.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307682025-03-07T23:31:04.225ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307692025-03-07T23:31:04.229ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307702025-03-07T23:31:04.229ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307712025-03-07T23:31:04.229ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307722025-03-07T23:31:04.230ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307732025-03-07T23:31:04.233ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307742025-03-07T23:31:04.233ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307752025-03-07T23:31:04.233ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307762025-03-07T23:31:04.233ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307772025-03-07T23:31:04.243ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307782025-03-07T23:31:04.253ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307792025-03-07T23:31:04.253ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307802025-03-07T23:31:04.253ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307812025-03-07T23:31:04.254ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307822025-03-07T23:31:04.261ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
307832025-03-07T23:31:04.262ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 188396 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2ad8ff6b-a58f-4601-ab6c-61d463a8c134 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307842025-03-07T23:31:04.262ZINFOtest_unauthorized (external client test context): client received response status = 200
307852025-03-07T23:31:04.262ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307862025-03-07T23:31:04.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307872025-03-07T23:31:04.263ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307882025-03-07T23:31:04.263ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307892025-03-07T23:31:04.263ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
307902025-03-07T23:31:04.263ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307912025-03-07T23:31:04.263ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307922025-03-07T23:31:04.264ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307932025-03-07T23:31:04.266ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307942025-03-07T23:31:04.266ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
307952025-03-07T23:31:04.266ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
307962025-03-07T23:31:04.268ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
307972025-03-07T23:31:04.268ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
307982025-03-07T23:31:04.268ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
307992025-03-07T23:31:04.268ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308002025-03-07T23:31:04.269ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308012025-03-07T23:31:04.272ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
308022025-03-07T23:31:04.272ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308032025-03-07T23:31:04.273ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308042025-03-07T23:31:04.273ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308052025-03-07T23:31:04.275ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
308062025-03-07T23:31:04.279ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
308072025-03-07T23:31:04.279ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308082025-03-07T23:31:04.279ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308092025-03-07T23:31:04.279ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308102025-03-07T23:31:04.282ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
308112025-03-07T23:31:04.282ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
308122025-03-07T23:31:04.282ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308132025-03-07T23:31:04.282ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308142025-03-07T23:31:04.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308152025-03-07T23:31:04.284ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
308162025-03-07T23:31:04.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
308172025-03-07T23:31:04.284ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
308182025-03-07T23:31:04.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
308192025-03-07T23:31:04.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
308202025-03-07T23:31:04.290ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
308212025-03-07T23:31:04.290ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308222025-03-07T23:31:04.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308232025-03-07T23:31:04.290ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308242025-03-07T23:31:04.295ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308252025-03-07T23:31:04.304ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308262025-03-07T23:31:04.304ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308272025-03-07T23:31:04.305ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308282025-03-07T23:31:04.330ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308292025-03-07T23:31:04.330ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308302025-03-07T23:31:04.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308312025-03-07T23:31:04.393ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308322025-03-07T23:31:04.398ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308332025-03-07T23:31:04.398ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308342025-03-07T23:31:04.398ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308352025-03-07T23:31:04.399ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308362025-03-07T23:31:04.520ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308372025-03-07T23:31:04.520ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308382025-03-07T23:31:04.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308392025-03-07T23:31:04.522ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308402025-03-07T23:31:04.567ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
308412025-03-07T23:31:04.568ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
308422025-03-07T23:31:04.572ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
308432025-03-07T23:31:04.573ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
308442025-03-07T23:31:04.573ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
308452025-03-07T23:31:04.573ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
308462025-03-07T23:31:04.574ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308472025-03-07T23:31:04.574ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308482025-03-07T23:31:04.576ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308492025-03-07T23:31:04.577ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308502025-03-07T23:31:04.606ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308512025-03-07T23:31:04.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308522025-03-07T23:31:04.628ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 365382 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0217d3fd-f602-4829-adc8-7433e3f52466 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308532025-03-07T23:31:04.629ZINFOtest_unauthorized (external client test context): client received response status = 404
308542025-03-07T23:31:04.629ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308552025-03-07T23:31:04.629ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308562025-03-07T23:31:04.630ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8826eb1b-06e6-43cd-af23-d52b12c32615 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308572025-03-07T23:31:04.630ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8826eb1b-06e6-43cd-af23-d52b12c32615 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308582025-03-07T23:31:04.630ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8826eb1b-06e6-43cd-af23-d52b12c32615 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308592025-03-07T23:31:04.630ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8826eb1b-06e6-43cd-af23-d52b12c32615 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308602025-03-07T23:31:04.632ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 2039 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 8826eb1b-06e6-43cd-af23-d52b12c32615 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308612025-03-07T23:31:04.632ZINFOtest_unauthorized (external client test context): client received response status = 401
308622025-03-07T23:31:04.632ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308632025-03-07T23:31:04.633ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308642025-03-07T23:31:04.633ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 948d5f53-a4d7-4ba7-83e0-d6684f20868f uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308652025-03-07T23:31:04.633ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 948d5f53-a4d7-4ba7-83e0-d6684f20868f uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308662025-03-07T23:31:04.634ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 948d5f53-a4d7-4ba7-83e0-d6684f20868f uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308672025-03-07T23:31:04.634ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 526 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 948d5f53-a4d7-4ba7-83e0-d6684f20868f response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308682025-03-07T23:31:04.634ZINFOtest_unauthorized (external client test context): client received response status = 401
308692025-03-07T23:31:04.634ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308702025-03-07T23:31:04.634ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308712025-03-07T23:31:04.640ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4aec18bd-4032-4757-8a8a-b92c2a6214fe uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308722025-03-07T23:31:04.640ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4aec18bd-4032-4757-8a8a-b92c2a6214fe uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308732025-03-07T23:31:04.642ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2632:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2665:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::AffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4aec18bd-4032-4757-8a8a-b92c2a6214fe uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308742025-03-07T23:31:04.642ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2046 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4aec18bd-4032-4757-8a8a-b92c2a6214fe response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308752025-03-07T23:31:04.643ZINFOtest_unauthorized (external client test context): client received response status = 401
308762025-03-07T23:31:04.643ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308772025-03-07T23:31:04.643ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308782025-03-07T23:31:04.643ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 038fe366-ee22-487c-b445-bd386d48f7ab uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308792025-03-07T23:31:04.644ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 177 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 038fe366-ee22-487c-b445-bd386d48f7ab response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308802025-03-07T23:31:04.644ZINFOtest_unauthorized (external client test context): client received response status = 405
308812025-03-07T23:31:04.644ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308822025-03-07T23:31:04.644ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308832025-03-07T23:31:04.644ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 713afa4e-c113-40b2-86ac-bcb808d4f9f3 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308842025-03-07T23:31:04.645ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 159 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 713afa4e-c113-40b2-86ac-bcb808d4f9f3 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308852025-03-07T23:31:04.645ZINFOtest_unauthorized (external client test context): client received response status = 405
308862025-03-07T23:31:04.645ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308872025-03-07T23:31:04.645ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308882025-03-07T23:31:04.645ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 284d90b5-6b76-4232-9ce2-ab3f826957ac uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308892025-03-07T23:31:04.646ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 198 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 284d90b5-6b76-4232-9ce2-ab3f826957ac response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308902025-03-07T23:31:04.646ZINFOtest_unauthorized (external client test context): client received response status = 405
308912025-03-07T23:31:04.646ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308922025-03-07T23:31:04.646ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308932025-03-07T23:31:04.646ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = df0a76a6-06dd-4895-97d1-ed488b45eded uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308942025-03-07T23:31:04.647ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 276 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = df0a76a6-06dd-4895-97d1-ed488b45eded response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308952025-03-07T23:31:04.647ZINFOtest_unauthorized (external client test context): client received response status = 405
308962025-03-07T23:31:04.647ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308972025-03-07T23:31:04.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308982025-03-07T23:31:04.648ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
308992025-03-07T23:31:04.648ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309002025-03-07T23:31:04.648ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309012025-03-07T23:31:04.648ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309022025-03-07T23:31:04.648ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309032025-03-07T23:31:04.649ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309042025-03-07T23:31:04.657ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309052025-03-07T23:31:04.657ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309062025-03-07T23:31:04.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309072025-03-07T23:31:04.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
309082025-03-07T23:31:04.678ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
309092025-03-07T23:31:04.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309102025-03-07T23:31:04.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309112025-03-07T23:31:04.680ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309122025-03-07T23:31:04.687ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
309132025-03-07T23:31:04.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309142025-03-07T23:31:04.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309152025-03-07T23:31:04.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309162025-03-07T23:31:04.732ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
309172025-03-07T23:31:04.745ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
309182025-03-07T23:31:04.745ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309192025-03-07T23:31:04.745ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309202025-03-07T23:31:04.746ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309212025-03-07T23:31:04.750ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
309222025-03-07T23:31:04.750ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
309232025-03-07T23:31:04.750ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309242025-03-07T23:31:04.750ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309252025-03-07T23:31:04.751ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309262025-03-07T23:31:04.759ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
309272025-03-07T23:31:04.759ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309282025-03-07T23:31:04.759ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309292025-03-07T23:31:04.760ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309302025-03-07T23:31:04.767ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
309312025-03-07T23:31:04.772ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
309322025-03-07T23:31:04.772ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309332025-03-07T23:31:04.772ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309342025-03-07T23:31:04.772ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309352025-03-07T23:31:04.772ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309362025-03-07T23:31:04.780ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309372025-03-07T23:31:04.781ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309382025-03-07T23:31:04.781ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309392025-03-07T23:31:04.787ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309402025-03-07T23:31:04.787ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309412025-03-07T23:31:04.788ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309422025-03-07T23:31:04.795ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309432025-03-07T23:31:04.795ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309442025-03-07T23:31:04.795ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309452025-03-07T23:31:04.795ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309462025-03-07T23:31:04.796ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309472025-03-07T23:31:04.807ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309482025-03-07T23:31:04.807ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309492025-03-07T23:31:04.807ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309502025-03-07T23:31:04.807ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309512025-03-07T23:31:04.811ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309522025-03-07T23:31:04.811ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309532025-03-07T23:31:04.811ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309542025-03-07T23:31:04.812ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309552025-03-07T23:31:04.834ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309562025-03-07T23:31:04.869ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309572025-03-07T23:31:04.873ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 225202 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ecc4b51b-5c47-4c6b-819e-ed1da7e80470 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309582025-03-07T23:31:04.874ZINFOtest_unauthorized (external client test context): client received response status = 404
309592025-03-07T23:31:04.874ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309602025-03-07T23:31:04.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309612025-03-07T23:31:04.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 86121f56-8e7f-498d-bee5-4311871e3f30 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309622025-03-07T23:31:04.875ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 86121f56-8e7f-498d-bee5-4311871e3f30 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309632025-03-07T23:31:04.875ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 86121f56-8e7f-498d-bee5-4311871e3f30 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309642025-03-07T23:31:04.875ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 86121f56-8e7f-498d-bee5-4311871e3f30 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309652025-03-07T23:31:04.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 363 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 86121f56-8e7f-498d-bee5-4311871e3f30 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309662025-03-07T23:31:04.876ZINFOtest_unauthorized (external client test context): client received response status = 401
309672025-03-07T23:31:04.876ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309682025-03-07T23:31:04.876ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309692025-03-07T23:31:04.876ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 28ff3b52-8262-477b-81e3-bc71775e2b71 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309702025-03-07T23:31:04.876ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 28ff3b52-8262-477b-81e3-bc71775e2b71 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309712025-03-07T23:31:04.876ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 28ff3b52-8262-477b-81e3-bc71775e2b71 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309722025-03-07T23:31:04.876ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 248 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 28ff3b52-8262-477b-81e3-bc71775e2b71 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309732025-03-07T23:31:04.876ZINFOtest_unauthorized (external client test context): client received response status = 401
309742025-03-07T23:31:04.877ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309752025-03-07T23:31:04.877ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309762025-03-07T23:31:04.877ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cf9fbd98-8127-44df-b216-498f08eb7951 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309772025-03-07T23:31:04.877ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cf9fbd98-8127-44df-b216-498f08eb7951 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309782025-03-07T23:31:04.878ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2676:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2710:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_add::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::AffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cf9fbd98-8127-44df-b216-498f08eb7951 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309792025-03-07T23:31:04.878ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1138 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = cf9fbd98-8127-44df-b216-498f08eb7951 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309802025-03-07T23:31:04.878ZINFOtest_unauthorized (external client test context): client received response status = 401
309812025-03-07T23:31:04.878ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309822025-03-07T23:31:04.878ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309832025-03-07T23:31:04.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309842025-03-07T23:31:04.879ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309852025-03-07T23:31:04.879ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
309862025-03-07T23:31:04.879ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309872025-03-07T23:31:04.879ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309882025-03-07T23:31:04.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309892025-03-07T23:31:04.882ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309902025-03-07T23:31:04.882ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309912025-03-07T23:31:04.883ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309922025-03-07T23:31:04.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
309932025-03-07T23:31:04.885ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
309942025-03-07T23:31:04.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309952025-03-07T23:31:04.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
309962025-03-07T23:31:04.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
309972025-03-07T23:31:04.891ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
309982025-03-07T23:31:04.914ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
309992025-03-07T23:31:04.914ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310002025-03-07T23:31:04.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310012025-03-07T23:31:04.939ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
310022025-03-07T23:31:04.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
310032025-03-07T23:31:04.943ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310042025-03-07T23:31:04.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310052025-03-07T23:31:04.963ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310062025-03-07T23:31:04.967ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
310072025-03-07T23:31:04.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
310082025-03-07T23:31:04.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310092025-03-07T23:31:04.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310102025-03-07T23:31:04.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310112025-03-07T23:31:04.986ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
310122025-03-07T23:31:04.986ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310132025-03-07T23:31:04.986ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310142025-03-07T23:31:04.987ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310152025-03-07T23:31:05.003ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
310162025-03-07T23:31:05.008ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
310172025-03-07T23:31:05.008ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310182025-03-07T23:31:05.009ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310192025-03-07T23:31:05.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310202025-03-07T23:31:05.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310212025-03-07T23:31:05.017ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310222025-03-07T23:31:05.017ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310232025-03-07T23:31:05.017ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310242025-03-07T23:31:05.038ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310252025-03-07T23:31:05.038ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310262025-03-07T23:31:05.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310272025-03-07T23:31:05.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310282025-03-07T23:31:05.050ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310292025-03-07T23:31:05.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310302025-03-07T23:31:05.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310312025-03-07T23:31:05.050ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310322025-03-07T23:31:05.054ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310332025-03-07T23:31:05.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310342025-03-07T23:31:05.054ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310352025-03-07T23:31:05.055ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310362025-03-07T23:31:05.058ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310372025-03-07T23:31:05.058ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310382025-03-07T23:31:05.058ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310392025-03-07T23:31:05.059ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310402025-03-07T23:31:05.075ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
310412025-03-07T23:31:05.076ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
310422025-03-07T23:31:05.076ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
310432025-03-07T23:31:05.079ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310442025-03-07T23:31:05.120ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Err(ObjectNotFound { type_name: AffinityGroup, lookup_type: ByName("demo-affinity-group") }) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310452025-03-07T23:31:05.121ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: affinity-group with name "demo-affinity-group" error_message_internal = not found: affinity-group with name "demo-affinity-group" latency_us = 242088 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d7d7ac5a-d80a-4ec5-9db4-2b65868cb079 response_code = 404 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310462025-03-07T23:31:05.121ZINFOtest_unauthorized (external client test context): client received response status = 404
310472025-03-07T23:31:05.121ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310482025-03-07T23:31:05.121ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310492025-03-07T23:31:05.121ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bcf70786-11be-4616-97bf-4a4e9ba23e56 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310502025-03-07T23:31:05.122ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bcf70786-11be-4616-97bf-4a4e9ba23e56 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310512025-03-07T23:31:05.122ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bcf70786-11be-4616-97bf-4a4e9ba23e56 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310522025-03-07T23:31:05.122ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bcf70786-11be-4616-97bf-4a4e9ba23e56 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310532025-03-07T23:31:05.122ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 325 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = bcf70786-11be-4616-97bf-4a4e9ba23e56 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310542025-03-07T23:31:05.122ZINFOtest_unauthorized (external client test context): client received response status = 401
310552025-03-07T23:31:05.122ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310562025-03-07T23:31:05.122ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310572025-03-07T23:31:05.122ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a6c8ed28-0e39-45b3-a7f8-986ecfff7664 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310582025-03-07T23:31:05.122ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a6c8ed28-0e39-45b3-a7f8-986ecfff7664 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310592025-03-07T23:31:05.122ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a6c8ed28-0e39-45b3-a7f8-986ecfff7664 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310602025-03-07T23:31:05.122ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 204 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a6c8ed28-0e39-45b3-a7f8-986ecfff7664 response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310612025-03-07T23:31:05.123ZINFOtest_unauthorized (external client test context): client received response status = 401
310622025-03-07T23:31:05.123ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310632025-03-07T23:31:05.123ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310642025-03-07T23:31:05.124ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 51b4a559-a697-47b3-a9c1-77402751785c uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310652025-03-07T23:31:05.124ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 51b4a559-a697-47b3-a9c1-77402751785c uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310662025-03-07T23:31:05.125ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2721:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2754:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::affinity_group_member_instance_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 51b4a559-a697-47b3-a9c1-77402751785c uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310672025-03-07T23:31:05.125ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1149 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 51b4a559-a697-47b3-a9c1-77402751785c response_code = 401 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310682025-03-07T23:31:05.125ZINFOtest_unauthorized (external client test context): client received response status = 401
310692025-03-07T23:31:05.125ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310702025-03-07T23:31:05.125ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310712025-03-07T23:31:05.125ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 857b80c4-e01d-43a4-8d18-bc900c2eccad uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310722025-03-07T23:31:05.125ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 857b80c4-e01d-43a4-8d18-bc900c2eccad response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310732025-03-07T23:31:05.125ZINFOtest_unauthorized (external client test context): client received response status = 405
310742025-03-07T23:31:05.125ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310752025-03-07T23:31:05.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310762025-03-07T23:31:05.126ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d44e0075-e29f-4e78-b4d8-6177bd3d2c09 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310772025-03-07T23:31:05.126ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d44e0075-e29f-4e78-b4d8-6177bd3d2c09 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310782025-03-07T23:31:05.129ZINFOtest_unauthorized (external client test context): client received response status = 405
310792025-03-07T23:31:05.129ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310802025-03-07T23:31:05.129ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310812025-03-07T23:31:05.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1bd8aefe-5793-48f6-b2cc-2c60c78c0e02 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310822025-03-07T23:31:05.150ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 137 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1bd8aefe-5793-48f6-b2cc-2c60c78c0e02 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310832025-03-07T23:31:05.151ZINFOtest_unauthorized (external client test context): client received response status = 405
310842025-03-07T23:31:05.151ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310852025-03-07T23:31:05.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310862025-03-07T23:31:05.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6d92965c-419c-47f8-b762-7dbba3205891 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310872025-03-07T23:31:05.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 67 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6d92965c-419c-47f8-b762-7dbba3205891 response_code = 405 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310882025-03-07T23:31:05.153ZINFOtest_unauthorized (external client test context): client received response status = 405
310892025-03-07T23:31:05.156ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310902025-03-07T23:31:05.156ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310912025-03-07T23:31:05.156ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310922025-03-07T23:31:05.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
310932025-03-07T23:31:05.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
310942025-03-07T23:31:05.157ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310952025-03-07T23:31:05.157ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
310962025-03-07T23:31:05.157ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
310972025-03-07T23:31:05.157ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
310982025-03-07T23:31:05.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
310992025-03-07T23:31:05.160ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
311002025-03-07T23:31:05.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
311012025-03-07T23:31:05.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311022025-03-07T23:31:05.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311032025-03-07T23:31:05.168ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311042025-03-07T23:31:05.174ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
311052025-03-07T23:31:05.174ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
311062025-03-07T23:31:05.180ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
311072025-03-07T23:31:05.180ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
311082025-03-07T23:31:05.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
311092025-03-07T23:31:05.180ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
311102025-03-07T23:31:05.180ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311112025-03-07T23:31:05.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311122025-03-07T23:31:05.182ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311132025-03-07T23:31:05.191ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
311142025-03-07T23:31:05.191ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311152025-03-07T23:31:05.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311162025-03-07T23:31:05.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311172025-03-07T23:31:05.232ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
311182025-03-07T23:31:05.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
311192025-03-07T23:31:05.244ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311202025-03-07T23:31:05.244ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311212025-03-07T23:31:05.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311222025-03-07T23:31:05.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
311232025-03-07T23:31:05.249ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
311242025-03-07T23:31:05.249ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311252025-03-07T23:31:05.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311262025-03-07T23:31:05.250ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311272025-03-07T23:31:05.268ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
311282025-03-07T23:31:05.274ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
311292025-03-07T23:31:05.274ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
311302025-03-07T23:31:05.274ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
311312025-03-07T23:31:05.275ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
311322025-03-07T23:31:05.277ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
311332025-03-07T23:31:05.281ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
311342025-03-07T23:31:05.281ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311352025-03-07T23:31:05.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311362025-03-07T23:31:05.281ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311372025-03-07T23:31:05.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311382025-03-07T23:31:05.283ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311392025-03-07T23:31:05.283ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311402025-03-07T23:31:05.284ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311412025-03-07T23:31:05.289ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311422025-03-07T23:31:05.289ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311432025-03-07T23:31:05.289ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311442025-03-07T23:31:05.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311452025-03-07T23:31:05.292ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311462025-03-07T23:31:05.292ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311472025-03-07T23:31:05.292ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311482025-03-07T23:31:05.292ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311492025-03-07T23:31:05.297ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311502025-03-07T23:31:05.297ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311512025-03-07T23:31:05.297ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311522025-03-07T23:31:05.297ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311532025-03-07T23:31:05.302ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311542025-03-07T23:31:05.302ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311552025-03-07T23:31:05.302ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311562025-03-07T23:31:05.304ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311572025-03-07T23:31:05.308ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311582025-03-07T23:31:05.323ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311592025-03-07T23:31:05.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311602025-03-07T23:31:05.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311612025-03-07T23:31:05.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311622025-03-07T23:31:05.326ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311632025-03-07T23:31:05.326ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311642025-03-07T23:31:05.327ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311652025-03-07T23:31:05.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311662025-03-07T23:31:05.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311672025-03-07T23:31:05.335ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311682025-03-07T23:31:05.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311692025-03-07T23:31:05.338ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311702025-03-07T23:31:05.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311712025-03-07T23:31:05.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311722025-03-07T23:31:05.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311732025-03-07T23:31:05.348ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311742025-03-07T23:31:05.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311752025-03-07T23:31:05.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311762025-03-07T23:31:05.353ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311772025-03-07T23:31:05.389ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311782025-03-07T23:31:05.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311792025-03-07T23:31:05.389ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311802025-03-07T23:31:05.392ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311812025-03-07T23:31:05.400ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311822025-03-07T23:31:05.413ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311832025-03-07T23:31:05.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311842025-03-07T23:31:05.415ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311852025-03-07T23:31:05.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311862025-03-07T23:31:05.416ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311872025-03-07T23:31:05.417ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311882025-03-07T23:31:05.417ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
311892025-03-07T23:31:05.418ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
311902025-03-07T23:31:05.418ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c7c577bf-3234-47f6-8bfc-516018ea883c uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
311912025-03-07T23:31:05.419ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c7c577bf-3234-47f6-8bfc-516018ea883c resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
311922025-03-07T23:31:05.419ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c7c577bf-3234-47f6-8bfc-516018ea883c roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
311932025-03-07T23:31:05.420ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c7c577bf-3234-47f6-8bfc-516018ea883c resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
311942025-03-07T23:31:05.423ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311952025-03-07T23:31:05.423ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311962025-03-07T23:31:05.423ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311972025-03-07T23:31:05.424ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
311982025-03-07T23:31:05.428ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9092 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c7c577bf-3234-47f6-8bfc-516018ea883c response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
311992025-03-07T23:31:05.428ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c7c577bf-3234-47f6-8bfc-516018ea883c", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:05 GMT"} })
312002025-03-07T23:31:05.429ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
312012025-03-07T23:31:05.430ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312022025-03-07T23:31:05.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312032025-03-07T23:31:05.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312042025-03-07T23:31:05.431ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312052025-03-07T23:31:05.432ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 275af179-a5fd-49a2-9130-fee1fcf39e98 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
312062025-03-07T23:31:05.432ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 275af179-a5fd-49a2-9130-fee1fcf39e98 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
312072025-03-07T23:31:05.432ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 275af179-a5fd-49a2-9130-fee1fcf39e98 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
312082025-03-07T23:31:05.433ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 275af179-a5fd-49a2-9130-fee1fcf39e98 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
312092025-03-07T23:31:05.436ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312102025-03-07T23:31:05.452ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312112025-03-07T23:31:05.452ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312122025-03-07T23:31:05.452ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 roles = RoleSet { roles: {} } uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312132025-03-07T23:31:05.452ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 resource = Database result = Ok(()) uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312142025-03-07T23:31:05.453ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 21080 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 275af179-a5fd-49a2-9130-fee1fcf39e98 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
312152025-03-07T23:31:05.454ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312162025-03-07T23:31:05.454ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "275af179-a5fd-49a2-9130-fee1fcf39e98", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:05 GMT"} })
312172025-03-07T23:31:05.454ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312182025-03-07T23:31:05.454ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312192025-03-07T23:31:05.454ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
312202025-03-07T23:31:05.454ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312212025-03-07T23:31:05.455ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = fdaecdb3-c7f2-43a3-ad49-4cd4820aeca3 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312222025-03-07T23:31:05.816ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 361021 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = fdaecdb3-c7f2-43a3-ad49-4cd4820aeca3 response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312232025-03-07T23:31:05.817ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 660521 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = d1adde02-e263-4083-8329-ac83be6b6579 response_code = 200 uri = /v1/affinity-groups/demo-affinity-group/members/instance/demo-stopped-instance?project=demo-project
312242025-03-07T23:31:05.817ZDEBGtest_unauthorized (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312252025-03-07T23:31:05.818ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312262025-03-07T23:31:05.818ZDEBGtest_unauthorized (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312272025-03-07T23:31:05.820ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312282025-03-07T23:31:05.820ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312292025-03-07T23:31:05.824ZINFOtest_unauthorized (external client test context): client received response status = 200
312302025-03-07T23:31:05.824ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups?project=demo-project
312312025-03-07T23:31:05.824ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups?project=demo-project
312322025-03-07T23:31:05.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
312332025-03-07T23:31:05.826ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c uri = /v1/anti-affinity-groups?project=demo-project
312342025-03-07T23:31:05.826ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312352025-03-07T23:31:05.827ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312362025-03-07T23:31:05.827ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312372025-03-07T23:31:05.827ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
312382025-03-07T23:31:05.827ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c uri = /v1/anti-affinity-groups?project=demo-project
312392025-03-07T23:31:05.827ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups?project=demo-project
312402025-03-07T23:31:05.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312412025-03-07T23:31:05.827ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312422025-03-07T23:31:05.828ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312432025-03-07T23:31:05.837ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312442025-03-07T23:31:05.837ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312452025-03-07T23:31:05.838ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312462025-03-07T23:31:05.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
312472025-03-07T23:31:05.844ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
312482025-03-07T23:31:05.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312492025-03-07T23:31:05.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312502025-03-07T23:31:05.845ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312512025-03-07T23:31:05.849ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
312522025-03-07T23:31:05.849ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312532025-03-07T23:31:05.849ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312542025-03-07T23:31:05.895ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312552025-03-07T23:31:05.901ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
312562025-03-07T23:31:05.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
312572025-03-07T23:31:05.903ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312582025-03-07T23:31:05.903ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312592025-03-07T23:31:05.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312602025-03-07T23:31:05.915ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
312612025-03-07T23:31:05.918ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
312622025-03-07T23:31:05.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312632025-03-07T23:31:05.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312642025-03-07T23:31:05.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312652025-03-07T23:31:05.936ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
312662025-03-07T23:31:05.937ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
312672025-03-07T23:31:05.937ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
312682025-03-07T23:31:05.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
312692025-03-07T23:31:05.942ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
312702025-03-07T23:31:05.946ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
312712025-03-07T23:31:05.946ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c uri = /v1/anti-affinity-groups?project=demo-project
312722025-03-07T23:31:05.946ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
312732025-03-07T23:31:05.946ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
312742025-03-07T23:31:05.946ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
312752025-03-07T23:31:06.469ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312762025-03-07T23:31:06.469ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312772025-03-07T23:31:06.469ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
312782025-03-07T23:31:06.472ZDEBGtest_unauthorized (results-sink): inserting 273 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
312792025-03-07T23:31:06.472ZDEBGtest_unauthorized (results-sink-cluster): inserting 273 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
312802025-03-07T23:31:06.472ZDEBGtest_unauthorized (clickhouse-client): unrolling 273 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
312812025-03-07T23:31:06.474ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
312822025-03-07T23:31:06.474ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric', 'virtual_machine:check') FORMAT Native;
312832025-03-07T23:31:06.475ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
312842025-03-07T23:31:06.476ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
312852025-03-07T23:31:06.476ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
312862025-03-07T23:31:06.476ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
312872025-03-07T23:31:06.477ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
312882025-03-07T23:31:06.477ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
312892025-03-07T23:31:06.477ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
312902025-03-07T23:31:06.477ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
312912025-03-07T23:31:06.480ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
312922025-03-07T23:31:06.482ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
312932025-03-07T23:31:06.482ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:31:06.474715243Z } timeseries_name = oximeter_collector:collections
312942025-03-07T23:31:06.490ZDEBGtest_unauthorized (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
312952025-03-07T23:31:06.490ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric', 'oximeter_collector:collections', 'virtual_machine:check') FORMAT Native;
312962025-03-07T23:31:06.492ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
312972025-03-07T23:31:06.493ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
312982025-03-07T23:31:06.493ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
312992025-03-07T23:31:06.493ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313002025-03-07T23:31:06.494ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313012025-03-07T23:31:06.495ZTRACtest_unauthorized (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
313022025-03-07T23:31:06.496ZDEBGtest_unauthorized (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:failed_collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }, FieldSchema { name: "reason", field_type: String, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-07T23:31:06.490535097Z } timeseries_name = oximeter_collector:failed_collections
313032025-03-07T23:31:06.859ZDEBGtest_unauthorized (clickhouse-client): inserting 2 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
313042025-03-07T23:31:06.859ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 6 n_rows = 2 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
313052025-03-07T23:31:06.863ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
313062025-03-07T23:31:06.863ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
313072025-03-07T23:31:06.863ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
313082025-03-07T23:31:06.864ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
313092025-03-07T23:31:06.865ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
313102025-03-07T23:31:06.865ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
313112025-03-07T23:31:06.865ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313122025-03-07T23:31:06.865ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313132025-03-07T23:31:06.866ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 7 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
313142025-03-07T23:31:06.873ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
313152025-03-07T23:31:06.874ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
313162025-03-07T23:31:06.874ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
313172025-03-07T23:31:06.875ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
313182025-03-07T23:31:06.875ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
313192025-03-07T23:31:06.875ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
313202025-03-07T23:31:06.875ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313212025-03-07T23:31:06.876ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313222025-03-07T23:31:06.877ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 7 table_name = fields_ipaddr
313232025-03-07T23:31:06.877ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 544 sql = INSERT INTO oximeter.fields_string FORMAT Native
313242025-03-07T23:31:06.883ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
313252025-03-07T23:31:06.892ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313262025-03-07T23:31:06.892ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
313272025-03-07T23:31:06.892ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
313282025-03-07T23:31:06.892ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
313292025-03-07T23:31:06.892ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313302025-03-07T23:31:06.893ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313312025-03-07T23:31:06.902ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
313322025-03-07T23:31:06.902ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
313332025-03-07T23:31:06.902ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313342025-03-07T23:31:06.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313352025-03-07T23:31:06.905ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 544 table_name = fields_string
313362025-03-07T23:31:06.905ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 275 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
313372025-03-07T23:31:06.911ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
313382025-03-07T23:31:06.911ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
313392025-03-07T23:31:06.911ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313402025-03-07T23:31:06.911ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313412025-03-07T23:31:06.913ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 275 table_name = fields_u16
313422025-03-07T23:31:06.913ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 281 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
313432025-03-07T23:31:06.918ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
313442025-03-07T23:31:06.936ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313452025-03-07T23:31:06.937ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database uri = /v1/anti-affinity-groups?project=demo-project
313462025-03-07T23:31:06.937ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
313472025-03-07T23:31:06.938ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
313482025-03-07T23:31:06.946ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 1120096 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2cf365ba-8b20-4221-b858-a1bccc64547c response_code = 200 uri = /v1/anti-affinity-groups?project=demo-project
313492025-03-07T23:31:06.950ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 281 table_name = fields_uuid
313502025-03-07T23:31:06.950ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 5 n_rows = 4 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
313512025-03-07T23:31:06.950ZINFOtest_unauthorized (external client test context): client received response status = 200
313522025-03-07T23:31:06.950ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups?project=demo-project
313532025-03-07T23:31:06.951ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
313542025-03-07T23:31:06.953ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff uri = /v1/anti-affinity-groups?project=demo-project
313552025-03-07T23:31:06.954ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff uri = /v1/anti-affinity-groups?project=demo-project
313562025-03-07T23:31:06.954ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups?project=demo-project
313572025-03-07T23:31:06.954ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313582025-03-07T23:31:06.954ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313592025-03-07T23:31:06.955ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313602025-03-07T23:31:06.958ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 4 table_name = measurements_cumulativeu64
313612025-03-07T23:31:06.958ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 268 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
313622025-03-07T23:31:06.964ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313632025-03-07T23:31:06.964ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313642025-03-07T23:31:06.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313652025-03-07T23:31:06.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
313662025-03-07T23:31:06.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
313672025-03-07T23:31:06.974ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313682025-03-07T23:31:06.974ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313692025-03-07T23:31:06.975ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313702025-03-07T23:31:06.977ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
313712025-03-07T23:31:06.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313722025-03-07T23:31:06.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313732025-03-07T23:31:06.979ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313742025-03-07T23:31:06.979ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 268 table_name = measurements_histogramu64
313752025-03-07T23:31:06.981ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
313762025-03-07T23:31:06.985ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
313772025-03-07T23:31:06.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
313782025-03-07T23:31:06.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313792025-03-07T23:31:06.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313802025-03-07T23:31:06.996ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313812025-03-07T23:31:06.997ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
313822025-03-07T23:31:06.998ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
313832025-03-07T23:31:06.999ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
313842025-03-07T23:31:06.999ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
313852025-03-07T23:31:07.003ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
313862025-03-07T23:31:07.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
313872025-03-07T23:31:07.009ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
313882025-03-07T23:31:07.009ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313892025-03-07T23:31:07.009ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313902025-03-07T23:31:07.011ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313912025-03-07T23:31:07.012ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
313922025-03-07T23:31:07.012ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
313932025-03-07T23:31:07.014ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
313942025-03-07T23:31:07.015ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
313952025-03-07T23:31:07.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
313962025-03-07T23:31:07.015ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
313972025-03-07T23:31:07.018ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
313982025-03-07T23:31:07.018ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
313992025-03-07T23:31:07.019ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
314002025-03-07T23:31:07.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
314012025-03-07T23:31:07.024ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff uri = /v1/anti-affinity-groups?project=demo-project
314022025-03-07T23:31:07.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
314032025-03-07T23:31:07.026ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
314042025-03-07T23:31:07.027ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
314052025-03-07T23:31:07.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
314062025-03-07T23:31:07.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
314072025-03-07T23:31:07.033ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
314082025-03-07T23:31:07.036ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
314092025-03-07T23:31:07.037ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
314102025-03-07T23:31:07.037ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
314112025-03-07T23:31:07.037ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
314122025-03-07T23:31:07.041ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
314132025-03-07T23:31:07.045ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
314142025-03-07T23:31:07.045ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
314152025-03-07T23:31:07.046ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
314162025-03-07T23:31:07.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
314172025-03-07T23:31:07.053ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
314182025-03-07T23:31:07.053ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database uri = /v1/anti-affinity-groups?project=demo-project
314192025-03-07T23:31:07.053ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
314202025-03-07T23:31:07.054ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
314212025-03-07T23:31:07.062ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
314222025-03-07T23:31:07.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/anti-affinity-groups?project=demo-project
314232025-03-07T23:31:07.086ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 132546 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6937fa16-d41c-4624-ad14-036363ae9bff response_code = 404 uri = /v1/anti-affinity-groups?project=demo-project
314242025-03-07T23:31:07.086ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
314252025-03-07T23:31:07.086ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
314262025-03-07T23:31:07.087ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
314272025-03-07T23:31:07.087ZINFOtest_unauthorized (external client test context): client received response status = 404
314282025-03-07T23:31:07.087ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups?project=demo-project
314292025-03-07T23:31:07.087ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314302025-03-07T23:31:07.088ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7edb4649-3d92-4f89-a9b0-bfe3af7ed29a uri = /v1/anti-affinity-groups?project=demo-project
314312025-03-07T23:31:07.088ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7edb4649-3d92-4f89-a9b0-bfe3af7ed29a uri = /v1/anti-affinity-groups?project=demo-project
314322025-03-07T23:31:07.088ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7edb4649-3d92-4f89-a9b0-bfe3af7ed29a uri = /v1/anti-affinity-groups?project=demo-project
314332025-03-07T23:31:07.088ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7edb4649-3d92-4f89-a9b0-bfe3af7ed29a uri = /v1/anti-affinity-groups?project=demo-project
314342025-03-07T23:31:07.088ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 636 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7edb4649-3d92-4f89-a9b0-bfe3af7ed29a response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
314352025-03-07T23:31:07.088ZINFOtest_unauthorized (external client test context): client received response status = 401
314362025-03-07T23:31:07.089ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups?project=demo-project
314372025-03-07T23:31:07.089ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314382025-03-07T23:31:07.089ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d70696b-4f90-4eb3-968a-11529f26443d uri = /v1/anti-affinity-groups?project=demo-project
314392025-03-07T23:31:07.089ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d70696b-4f90-4eb3-968a-11529f26443d uri = /v1/anti-affinity-groups?project=demo-project
314402025-03-07T23:31:07.089ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d70696b-4f90-4eb3-968a-11529f26443d uri = /v1/anti-affinity-groups?project=demo-project
314412025-03-07T23:31:07.089ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 466 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1d70696b-4f90-4eb3-968a-11529f26443d response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
314422025-03-07T23:31:07.090ZINFOtest_unauthorized (external client test context): client received response status = 401
314432025-03-07T23:31:07.090ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups?project=demo-project
314442025-03-07T23:31:07.090ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314452025-03-07T23:31:07.090ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 42ce550a-f6a8-48cb-a048-d0f535a13556 uri = /v1/anti-affinity-groups?project=demo-project
314462025-03-07T23:31:07.090ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 42ce550a-f6a8-48cb-a048-d0f535a13556 uri = /v1/anti-affinity-groups?project=demo-project
314472025-03-07T23:31:07.092ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2855:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AntiAffinityGroup>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2879:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AntiAffinityGroup>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::AntiAffinityGroup>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 42ce550a-f6a8-48cb-a048-d0f535a13556 uri = /v1/anti-affinity-groups?project=demo-project
314482025-03-07T23:31:07.092ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1781 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 42ce550a-f6a8-48cb-a048-d0f535a13556 response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
314492025-03-07T23:31:07.092ZINFOtest_unauthorized (external client test context): client received response status = 401
314502025-03-07T23:31:07.093ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups?project=demo-project
314512025-03-07T23:31:07.093ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314522025-03-07T23:31:07.093ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30571009-03b0-4985-aa9e-8eeccd636a14 uri = /v1/anti-affinity-groups?project=demo-project
314532025-03-07T23:31:07.093ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 30571009-03b0-4985-aa9e-8eeccd636a14 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
314542025-03-07T23:31:07.093ZINFOtest_unauthorized (external client test context): client received response status = 405
314552025-03-07T23:31:07.093ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups?project=demo-project
314562025-03-07T23:31:07.094ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314572025-03-07T23:31:07.094ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 628b9aab-b499-486b-8bb5-3599a36fc10f uri = /v1/anti-affinity-groups?project=demo-project
314582025-03-07T23:31:07.094ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 157 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 628b9aab-b499-486b-8bb5-3599a36fc10f response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
314592025-03-07T23:31:07.094ZINFOtest_unauthorized (external client test context): client received response status = 405
314602025-03-07T23:31:07.094ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups?project=demo-project
314612025-03-07T23:31:07.094ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314622025-03-07T23:31:07.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 662d2265-9001-4a0e-815a-1df321292e97 uri = /v1/anti-affinity-groups?project=demo-project
314632025-03-07T23:31:07.095ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 662d2265-9001-4a0e-815a-1df321292e97 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
314642025-03-07T23:31:07.095ZINFOtest_unauthorized (external client test context): client received response status = 405
314652025-03-07T23:31:07.095ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups?project=demo-project
314662025-03-07T23:31:07.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314672025-03-07T23:31:07.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82a973c8-cb25-47af-8989-8b72a119da2a uri = /v1/anti-affinity-groups?project=demo-project
314682025-03-07T23:31:07.095ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82a973c8-cb25-47af-8989-8b72a119da2a response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
314692025-03-07T23:31:07.096ZINFOtest_unauthorized (external client test context): client received response status = 405
314702025-03-07T23:31:07.096ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups?project=demo-project
314712025-03-07T23:31:07.096ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
314722025-03-07T23:31:07.096ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 uri = /v1/anti-affinity-groups?project=demo-project
314732025-03-07T23:31:07.096ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 uri = /v1/anti-affinity-groups?project=demo-project
314742025-03-07T23:31:07.096ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups?project=demo-project
314752025-03-07T23:31:07.096ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
314762025-03-07T23:31:07.096ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
314772025-03-07T23:31:07.097ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
314782025-03-07T23:31:07.101ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
314792025-03-07T23:31:07.101ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
314802025-03-07T23:31:07.101ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
314812025-03-07T23:31:07.121ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
314822025-03-07T23:31:07.121ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
314832025-03-07T23:31:07.121ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
314842025-03-07T23:31:07.121ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
314852025-03-07T23:31:07.124ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
314862025-03-07T23:31:07.135ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
314872025-03-07T23:31:07.135ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
314882025-03-07T23:31:07.135ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
314892025-03-07T23:31:07.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
314902025-03-07T23:31:07.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
314912025-03-07T23:31:07.146ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
314922025-03-07T23:31:07.146ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
314932025-03-07T23:31:07.146ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
314942025-03-07T23:31:07.147ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
314952025-03-07T23:31:07.152ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
314962025-03-07T23:31:07.152ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
314972025-03-07T23:31:07.152ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
314982025-03-07T23:31:07.152ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
314992025-03-07T23:31:07.152ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315002025-03-07T23:31:07.154ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
315012025-03-07T23:31:07.154ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
315022025-03-07T23:31:07.155ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
315032025-03-07T23:31:07.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
315042025-03-07T23:31:07.156ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
315052025-03-07T23:31:07.156ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
315062025-03-07T23:31:07.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
315072025-03-07T23:31:07.162ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
315082025-03-07T23:31:07.162ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 uri = /v1/anti-affinity-groups?project=demo-project
315092025-03-07T23:31:07.162ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
315102025-03-07T23:31:07.162ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
315112025-03-07T23:31:07.162ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
315122025-03-07T23:31:07.165ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
315132025-03-07T23:31:07.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
315142025-03-07T23:31:07.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
315152025-03-07T23:31:07.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
315162025-03-07T23:31:07.168ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
315172025-03-07T23:31:07.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
315182025-03-07T23:31:07.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
315192025-03-07T23:31:07.169ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
315202025-03-07T23:31:07.172ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
315212025-03-07T23:31:07.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
315222025-03-07T23:31:07.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
315232025-03-07T23:31:07.172ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
315242025-03-07T23:31:07.175ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
315252025-03-07T23:31:07.175ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database uri = /v1/anti-affinity-groups?project=demo-project
315262025-03-07T23:31:07.175ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
315272025-03-07T23:31:07.180ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
315282025-03-07T23:31:07.186ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
315292025-03-07T23:31:07.238ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/anti-affinity-groups?project=demo-project
315302025-03-07T23:31:07.238ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 142267 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 31d0269c-3bfc-43ff-aaca-7321a9ab8292 response_code = 404 uri = /v1/anti-affinity-groups?project=demo-project
315312025-03-07T23:31:07.239ZINFOtest_unauthorized (external client test context): client received response status = 404
315322025-03-07T23:31:07.245ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups?project=demo-project
315332025-03-07T23:31:07.245ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315342025-03-07T23:31:07.246ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a06c13e-71c3-40b0-bb89-1aa1fb834150 uri = /v1/anti-affinity-groups?project=demo-project
315352025-03-07T23:31:07.248ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a06c13e-71c3-40b0-bb89-1aa1fb834150 uri = /v1/anti-affinity-groups?project=demo-project
315362025-03-07T23:31:07.248ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a06c13e-71c3-40b0-bb89-1aa1fb834150 uri = /v1/anti-affinity-groups?project=demo-project
315372025-03-07T23:31:07.248ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a06c13e-71c3-40b0-bb89-1aa1fb834150 uri = /v1/anti-affinity-groups?project=demo-project
315382025-03-07T23:31:07.248ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 2308 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a06c13e-71c3-40b0-bb89-1aa1fb834150 response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
315392025-03-07T23:31:07.252ZINFOtest_unauthorized (external client test context): client received response status = 401
315402025-03-07T23:31:07.252ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups?project=demo-project
315412025-03-07T23:31:07.253ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315422025-03-07T23:31:07.254ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 75e466bf-f597-42d6-8df5-0baba9da1aef uri = /v1/anti-affinity-groups?project=demo-project
315432025-03-07T23:31:07.254ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 75e466bf-f597-42d6-8df5-0baba9da1aef uri = /v1/anti-affinity-groups?project=demo-project
315442025-03-07T23:31:07.255ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 75e466bf-f597-42d6-8df5-0baba9da1aef uri = /v1/anti-affinity-groups?project=demo-project
315452025-03-07T23:31:07.255ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 796 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 75e466bf-f597-42d6-8df5-0baba9da1aef response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
315462025-03-07T23:31:07.255ZINFOtest_unauthorized (external client test context): client received response status = 401
315472025-03-07T23:31:07.255ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups?project=demo-project
315482025-03-07T23:31:07.255ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315492025-03-07T23:31:07.256ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35498490-e29f-48ba-a7ec-a0263902225f uri = /v1/anti-affinity-groups?project=demo-project
315502025-03-07T23:31:07.256ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35498490-e29f-48ba-a7ec-a0263902225f uri = /v1/anti-affinity-groups?project=demo-project
315512025-03-07T23:31:07.258ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3241:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AntiAffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3260:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AntiAffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::AntiAffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35498490-e29f-48ba-a7ec-a0263902225f uri = /v1/anti-affinity-groups?project=demo-project
315522025-03-07T23:31:07.258ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2058 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 35498490-e29f-48ba-a7ec-a0263902225f response_code = 401 uri = /v1/anti-affinity-groups?project=demo-project
315532025-03-07T23:31:07.258ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
315542025-03-07T23:31:07.258ZINFOtest_unauthorized (external client test context): client received response status = 401
315552025-03-07T23:31:07.258ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups?project=demo-project
315562025-03-07T23:31:07.259ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315572025-03-07T23:31:07.259ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58100b4c-87cf-485d-8dc5-d85998b04a82 uri = /v1/anti-affinity-groups?project=demo-project
315582025-03-07T23:31:07.259ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 158 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58100b4c-87cf-485d-8dc5-d85998b04a82 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315592025-03-07T23:31:07.259ZINFOtest_unauthorized (external client test context): client received response status = 405
315602025-03-07T23:31:07.259ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups?project=demo-project
315612025-03-07T23:31:07.260ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315622025-03-07T23:31:07.260ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 18311892-d247-4bec-b7ec-8fffb4646a84 uri = /v1/anti-affinity-groups?project=demo-project
315632025-03-07T23:31:07.260ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 18311892-d247-4bec-b7ec-8fffb4646a84 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315642025-03-07T23:31:07.260ZINFOtest_unauthorized (external client test context): client received response status = 405
315652025-03-07T23:31:07.261ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups?project=demo-project
315662025-03-07T23:31:07.261ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315672025-03-07T23:31:07.261ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 78d7ab48-97e4-4cdc-927d-c7b3d4a6071b uri = /v1/anti-affinity-groups?project=demo-project
315682025-03-07T23:31:07.261ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 155 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 78d7ab48-97e4-4cdc-927d-c7b3d4a6071b response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315692025-03-07T23:31:07.262ZINFOtest_unauthorized (external client test context): client received response status = 405
315702025-03-07T23:31:07.262ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups?project=demo-project
315712025-03-07T23:31:07.262ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315722025-03-07T23:31:07.262ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1a866ce9-bca5-43ce-8589-74305ded8bce uri = /v1/anti-affinity-groups?project=demo-project
315732025-03-07T23:31:07.262ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 151 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1a866ce9-bca5-43ce-8589-74305ded8bce response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315742025-03-07T23:31:07.263ZINFOtest_unauthorized (external client test context): client received response status = 405
315752025-03-07T23:31:07.263ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups?project=demo-project
315762025-03-07T23:31:07.263ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315772025-03-07T23:31:07.264ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 934438c6-48e5-40a0-a43e-3c30f73d72d9 uri = /v1/anti-affinity-groups?project=demo-project
315782025-03-07T23:31:07.264ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 934438c6-48e5-40a0-a43e-3c30f73d72d9 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315792025-03-07T23:31:07.264ZINFOtest_unauthorized (external client test context): client received response status = 405
315802025-03-07T23:31:07.264ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups?project=demo-project
315812025-03-07T23:31:07.264ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315822025-03-07T23:31:07.265ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 908d09cf-2fec-4382-b32c-a317f2ef8f55 uri = /v1/anti-affinity-groups?project=demo-project
315832025-03-07T23:31:07.265ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 156 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 908d09cf-2fec-4382-b32c-a317f2ef8f55 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315842025-03-07T23:31:07.265ZINFOtest_unauthorized (external client test context): client received response status = 405
315852025-03-07T23:31:07.265ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups?project=demo-project
315862025-03-07T23:31:07.265ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315872025-03-07T23:31:07.266ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2481fa9f-ebe7-4474-ae51-19a9c9f17139 uri = /v1/anti-affinity-groups?project=demo-project
315882025-03-07T23:31:07.266ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 178 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2481fa9f-ebe7-4474-ae51-19a9c9f17139 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315892025-03-07T23:31:07.266ZINFOtest_unauthorized (external client test context): client received response status = 405
315902025-03-07T23:31:07.266ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups?project=demo-project
315912025-03-07T23:31:07.267ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315922025-03-07T23:31:07.267ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2398732e-7cea-4902-abd4-b0052c375d17 uri = /v1/anti-affinity-groups?project=demo-project
315932025-03-07T23:31:07.267ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 146 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2398732e-7cea-4902-abd4-b0052c375d17 response_code = 405 uri = /v1/anti-affinity-groups?project=demo-project
315942025-03-07T23:31:07.267ZINFOtest_unauthorized (external client test context): client received response status = 405
315952025-03-07T23:31:07.267ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups?project=demo-project
315962025-03-07T23:31:07.268ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups?project=demo-project
315972025-03-07T23:31:07.268ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a uri = /v1/anti-affinity-groups?project=demo-project
315982025-03-07T23:31:07.268ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a uri = /v1/anti-affinity-groups?project=demo-project
315992025-03-07T23:31:07.268ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups?project=demo-project
316002025-03-07T23:31:07.269ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316012025-03-07T23:31:07.269ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316022025-03-07T23:31:07.271ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316032025-03-07T23:31:07.276ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316042025-03-07T23:31:07.276ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316052025-03-07T23:31:07.279ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316062025-03-07T23:31:07.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
316072025-03-07T23:31:07.281ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
316082025-03-07T23:31:07.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316092025-03-07T23:31:07.281ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316102025-03-07T23:31:07.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316112025-03-07T23:31:07.284ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
316122025-03-07T23:31:07.284ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316132025-03-07T23:31:07.285ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316142025-03-07T23:31:07.285ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316152025-03-07T23:31:07.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
316162025-03-07T23:31:07.294ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
316172025-03-07T23:31:07.294ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316182025-03-07T23:31:07.294ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316192025-03-07T23:31:07.295ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316202025-03-07T23:31:07.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
316212025-03-07T23:31:07.299ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
316222025-03-07T23:31:07.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316232025-03-07T23:31:07.299ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316242025-03-07T23:31:07.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316252025-03-07T23:31:07.302ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
316262025-03-07T23:31:07.302ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316272025-03-07T23:31:07.302ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316282025-03-07T23:31:07.302ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316292025-03-07T23:31:07.305ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
316302025-03-07T23:31:07.312ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
316312025-03-07T23:31:07.312ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a uri = /v1/anti-affinity-groups?project=demo-project
316322025-03-07T23:31:07.312ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316332025-03-07T23:31:07.312ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316342025-03-07T23:31:07.313ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316352025-03-07T23:31:07.316ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316362025-03-07T23:31:07.317ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316372025-03-07T23:31:07.317ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316382025-03-07T23:31:07.319ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
316392025-03-07T23:31:07.319ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
316402025-03-07T23:31:07.319ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316412025-03-07T23:31:07.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316422025-03-07T23:31:07.319ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316432025-03-07T23:31:07.323ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
316442025-03-07T23:31:07.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316452025-03-07T23:31:07.323ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316462025-03-07T23:31:07.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316472025-03-07T23:31:07.329ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
316482025-03-07T23:31:07.329ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316492025-03-07T23:31:07.330ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316502025-03-07T23:31:07.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316512025-03-07T23:31:07.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
316522025-03-07T23:31:07.344ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316532025-03-07T23:31:07.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/anti-affinity-groups?project=demo-project
316542025-03-07T23:31:07.344ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups?project=demo-project
316552025-03-07T23:31:07.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316562025-03-07T23:31:07.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316572025-03-07T23:31:07.345ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316582025-03-07T23:31:07.348ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups?project=demo-project
316592025-03-07T23:31:07.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316602025-03-07T23:31:07.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316612025-03-07T23:31:07.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316622025-03-07T23:31:07.354ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups?project=demo-project
316632025-03-07T23:31:07.354ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316642025-03-07T23:31:07.354ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316652025-03-07T23:31:07.355ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316662025-03-07T23:31:07.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups?project=demo-project
316672025-03-07T23:31:07.374ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316682025-03-07T23:31:07.374ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database uri = /v1/anti-affinity-groups?project=demo-project
316692025-03-07T23:31:07.375ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups?project=demo-project
316702025-03-07T23:31:07.375ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a resource = Database result = Ok(()) uri = /v1/anti-affinity-groups?project=demo-project
316712025-03-07T23:31:07.378ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 110083 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 75e1715a-e135-48c7-b217-f140aba5bb4a response_code = 200 uri = /v1/anti-affinity-groups?project=demo-project
316722025-03-07T23:31:07.381ZINFOtest_unauthorized (external client test context): client received response status = 200
316732025-03-07T23:31:07.381ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
316742025-03-07T23:31:07.381ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
316752025-03-07T23:31:07.381ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
316762025-03-07T23:31:07.382ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
316772025-03-07T23:31:07.382ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
316782025-03-07T23:31:07.382ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
316792025-03-07T23:31:07.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316802025-03-07T23:31:07.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316812025-03-07T23:31:07.383ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316822025-03-07T23:31:07.386ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316832025-03-07T23:31:07.386ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316842025-03-07T23:31:07.387ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316852025-03-07T23:31:07.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
316862025-03-07T23:31:07.392ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
316872025-03-07T23:31:07.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316882025-03-07T23:31:07.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316892025-03-07T23:31:07.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316902025-03-07T23:31:07.393ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
316912025-03-07T23:31:07.393ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316922025-03-07T23:31:07.394ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316932025-03-07T23:31:07.394ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316942025-03-07T23:31:07.396ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
316952025-03-07T23:31:07.401ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
316962025-03-07T23:31:07.401ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
316972025-03-07T23:31:07.401ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
316982025-03-07T23:31:07.402ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
316992025-03-07T23:31:07.405ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
317002025-03-07T23:31:07.405ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
317012025-03-07T23:31:07.405ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317022025-03-07T23:31:07.405ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317032025-03-07T23:31:07.406ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317042025-03-07T23:31:07.410ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
317052025-03-07T23:31:07.410ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317062025-03-07T23:31:07.410ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317072025-03-07T23:31:07.410ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317082025-03-07T23:31:07.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
317092025-03-07T23:31:07.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
317102025-03-07T23:31:07.412ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2317b314-dad8-4c04-a71a-a305e4943dc0 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
317112025-03-07T23:31:07.412ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2317b314-dad8-4c04-a71a-a305e4943dc0 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
317122025-03-07T23:31:07.412ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2317b314-dad8-4c04-a71a-a305e4943dc0 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
317132025-03-07T23:31:07.413ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2317b314-dad8-4c04-a71a-a305e4943dc0 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
317142025-03-07T23:31:07.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
317152025-03-07T23:31:07.417ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
317162025-03-07T23:31:07.417ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317172025-03-07T23:31:07.418ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317182025-03-07T23:31:07.418ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317192025-03-07T23:31:07.418ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317202025-03-07T23:31:07.422ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317212025-03-07T23:31:07.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317222025-03-07T23:31:07.423ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317232025-03-07T23:31:07.423ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 10706 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2317b314-dad8-4c04-a71a-a305e4943dc0 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
317242025-03-07T23:31:07.423ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "2317b314-dad8-4c04-a71a-a305e4943dc0", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:06 GMT"} })
317252025-03-07T23:31:07.424ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
317262025-03-07T23:31:07.424ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = b1afa653-39cc-48f6-ad8c-316d28ff422c uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
317272025-03-07T23:31:07.424ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = b1afa653-39cc-48f6-ad8c-316d28ff422c resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
317282025-03-07T23:31:07.424ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = b1afa653-39cc-48f6-ad8c-316d28ff422c roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
317292025-03-07T23:31:07.425ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = b1afa653-39cc-48f6-ad8c-316d28ff422c resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
317302025-03-07T23:31:07.425ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317312025-03-07T23:31:07.426ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317322025-03-07T23:31:07.426ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317332025-03-07T23:31:07.428ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4314 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = b1afa653-39cc-48f6-ad8c-316d28ff422c response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
317342025-03-07T23:31:07.429ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "b1afa653-39cc-48f6-ad8c-316d28ff422c", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:06 GMT"} })
317352025-03-07T23:31:07.429ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
317362025-03-07T23:31:07.429ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317372025-03-07T23:31:07.429ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
317382025-03-07T23:31:07.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317392025-03-07T23:31:07.430ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317402025-03-07T23:31:07.430ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317412025-03-07T23:31:07.430ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317422025-03-07T23:31:07.430ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317432025-03-07T23:31:07.433ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317442025-03-07T23:31:07.433ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317452025-03-07T23:31:07.434ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317462025-03-07T23:31:07.434ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317472025-03-07T23:31:07.438ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317482025-03-07T23:31:07.438ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317492025-03-07T23:31:07.438ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317502025-03-07T23:31:07.439ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317512025-03-07T23:31:07.452ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317522025-03-07T23:31:07.466ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317532025-03-07T23:31:07.466ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 84084 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6103c0e-2529-4f9d-84c3-704f21f16659 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317542025-03-07T23:31:07.466ZINFOtest_unauthorized (external client test context): client received response status = 200
317552025-03-07T23:31:07.467ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317562025-03-07T23:31:07.467ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317572025-03-07T23:31:07.467ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317582025-03-07T23:31:07.467ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317592025-03-07T23:31:07.467ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317602025-03-07T23:31:07.467ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317612025-03-07T23:31:07.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317622025-03-07T23:31:07.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317632025-03-07T23:31:07.483ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317642025-03-07T23:31:07.484ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317652025-03-07T23:31:07.485ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317662025-03-07T23:31:07.500ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
317672025-03-07T23:31:07.500ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
317682025-03-07T23:31:07.501ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317692025-03-07T23:31:07.501ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317702025-03-07T23:31:07.502ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317712025-03-07T23:31:07.515ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
317722025-03-07T23:31:07.516ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317732025-03-07T23:31:07.516ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317742025-03-07T23:31:07.517ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317752025-03-07T23:31:07.520ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
317762025-03-07T23:31:07.525ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
317772025-03-07T23:31:07.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317782025-03-07T23:31:07.525ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317792025-03-07T23:31:07.526ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317802025-03-07T23:31:07.539ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
317812025-03-07T23:31:07.557ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
317822025-03-07T23:31:07.557ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317832025-03-07T23:31:07.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317842025-03-07T23:31:07.559ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317852025-03-07T23:31:07.565ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317862025-03-07T23:31:07.565ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317872025-03-07T23:31:07.569ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
317882025-03-07T23:31:07.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
317892025-03-07T23:31:07.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
317902025-03-07T23:31:07.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
317912025-03-07T23:31:07.570ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317922025-03-07T23:31:07.571ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317932025-03-07T23:31:07.571ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317942025-03-07T23:31:07.571ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
317952025-03-07T23:31:07.576ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
317962025-03-07T23:31:07.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
317972025-03-07T23:31:07.582ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317982025-03-07T23:31:07.582ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
317992025-03-07T23:31:07.582ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318002025-03-07T23:31:07.583ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318012025-03-07T23:31:07.585ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318022025-03-07T23:31:07.585ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318032025-03-07T23:31:07.585ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318042025-03-07T23:31:07.589ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318052025-03-07T23:31:07.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318062025-03-07T23:31:07.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318072025-03-07T23:31:07.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318082025-03-07T23:31:07.596ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318092025-03-07T23:31:07.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318102025-03-07T23:31:07.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318112025-03-07T23:31:07.598ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318122025-03-07T23:31:07.601ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318132025-03-07T23:31:07.601ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318142025-03-07T23:31:07.601ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318152025-03-07T23:31:07.602ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318162025-03-07T23:31:07.607ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318172025-03-07T23:31:07.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318182025-03-07T23:31:07.629ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318192025-03-07T23:31:07.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318202025-03-07T23:31:07.648ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318212025-03-07T23:31:07.661ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318222025-03-07T23:31:07.661ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 194116 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2fb28a95-7c7e-411b-a193-73cf4d32e830 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318232025-03-07T23:31:07.661ZINFOtest_unauthorized (external client test context): client received response status = 404
318242025-03-07T23:31:07.662ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318252025-03-07T23:31:07.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318262025-03-07T23:31:07.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3da9f9da-f7a8-4cf2-8d87-6274e29c8e69 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318272025-03-07T23:31:07.662ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3da9f9da-f7a8-4cf2-8d87-6274e29c8e69 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318282025-03-07T23:31:07.662ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3da9f9da-f7a8-4cf2-8d87-6274e29c8e69 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318292025-03-07T23:31:07.662ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3da9f9da-f7a8-4cf2-8d87-6274e29c8e69 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318302025-03-07T23:31:07.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 300 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 3da9f9da-f7a8-4cf2-8d87-6274e29c8e69 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318312025-03-07T23:31:07.662ZINFOtest_unauthorized (external client test context): client received response status = 401
318322025-03-07T23:31:07.662ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318332025-03-07T23:31:07.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318342025-03-07T23:31:07.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 943a7fb6-bb1c-490f-9f40-d94887ec6c56 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318352025-03-07T23:31:07.663ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 943a7fb6-bb1c-490f-9f40-d94887ec6c56 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318362025-03-07T23:31:07.663ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 943a7fb6-bb1c-490f-9f40-d94887ec6c56 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318372025-03-07T23:31:07.663ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 242 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 943a7fb6-bb1c-490f-9f40-d94887ec6c56 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318382025-03-07T23:31:07.663ZINFOtest_unauthorized (external client test context): client received response status = 401
318392025-03-07T23:31:07.663ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318402025-03-07T23:31:07.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318412025-03-07T23:31:07.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4c94732b-f6b7-436c-a1d6-4196a1ed63cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318422025-03-07T23:31:07.663ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4c94732b-f6b7-436c-a1d6-4196a1ed63cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318432025-03-07T23:31:07.665ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2892:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2911:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4c94732b-f6b7-436c-a1d6-4196a1ed63cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318442025-03-07T23:31:07.665ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1360 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4c94732b-f6b7-436c-a1d6-4196a1ed63cc response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318452025-03-07T23:31:07.665ZINFOtest_unauthorized (external client test context): client received response status = 401
318462025-03-07T23:31:07.665ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318472025-03-07T23:31:07.665ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318482025-03-07T23:31:07.665ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318492025-03-07T23:31:07.665ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318502025-03-07T23:31:07.666ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318512025-03-07T23:31:07.666ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318522025-03-07T23:31:07.666ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318532025-03-07T23:31:07.666ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318542025-03-07T23:31:07.673ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318552025-03-07T23:31:07.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318562025-03-07T23:31:07.674ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318572025-03-07T23:31:07.680ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
318582025-03-07T23:31:07.680ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
318592025-03-07T23:31:07.681ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318602025-03-07T23:31:07.681ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318612025-03-07T23:31:07.682ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318622025-03-07T23:31:07.686ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
318632025-03-07T23:31:07.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318642025-03-07T23:31:07.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318652025-03-07T23:31:07.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318662025-03-07T23:31:07.699ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
318672025-03-07T23:31:07.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
318682025-03-07T23:31:07.721ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318692025-03-07T23:31:07.721ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318702025-03-07T23:31:07.722ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318712025-03-07T23:31:07.726ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
318722025-03-07T23:31:07.726ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
318732025-03-07T23:31:07.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318742025-03-07T23:31:07.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318752025-03-07T23:31:07.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318762025-03-07T23:31:07.733ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
318772025-03-07T23:31:07.734ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
318782025-03-07T23:31:07.734ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
318792025-03-07T23:31:07.734ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
318802025-03-07T23:31:07.743ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
318812025-03-07T23:31:07.747ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
318822025-03-07T23:31:07.747ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318832025-03-07T23:31:07.747ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318842025-03-07T23:31:07.747ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318852025-03-07T23:31:07.748ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318862025-03-07T23:31:07.753ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318872025-03-07T23:31:07.753ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318882025-03-07T23:31:07.754ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318892025-03-07T23:31:07.761ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318902025-03-07T23:31:07.761ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318912025-03-07T23:31:07.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318922025-03-07T23:31:07.784ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318932025-03-07T23:31:07.784ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318942025-03-07T23:31:07.784ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318952025-03-07T23:31:07.784ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318962025-03-07T23:31:07.786ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318972025-03-07T23:31:07.801ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318982025-03-07T23:31:07.801ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
318992025-03-07T23:31:07.801ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319002025-03-07T23:31:07.801ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319012025-03-07T23:31:07.810ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319022025-03-07T23:31:07.810ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319032025-03-07T23:31:07.811ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319042025-03-07T23:31:07.811ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319052025-03-07T23:31:07.831ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319062025-03-07T23:31:07.857ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319072025-03-07T23:31:07.859ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 193638 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 82537ee7-22ef-40e2-8368-ca268f2e3e58 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319082025-03-07T23:31:07.859ZINFOtest_unauthorized (external client test context): client received response status = 404
319092025-03-07T23:31:07.860ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319102025-03-07T23:31:07.860ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319112025-03-07T23:31:07.860ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c516a25-c844-4e6a-8b71-a0a8b1b848f8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319122025-03-07T23:31:07.860ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c516a25-c844-4e6a-8b71-a0a8b1b848f8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319132025-03-07T23:31:07.860ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c516a25-c844-4e6a-8b71-a0a8b1b848f8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319142025-03-07T23:31:07.860ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c516a25-c844-4e6a-8b71-a0a8b1b848f8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319152025-03-07T23:31:07.860ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 400 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4c516a25-c844-4e6a-8b71-a0a8b1b848f8 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319162025-03-07T23:31:07.861ZINFOtest_unauthorized (external client test context): client received response status = 401
319172025-03-07T23:31:07.861ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319182025-03-07T23:31:07.861ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319192025-03-07T23:31:07.861ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7bda116f-160a-4128-8774-35640da7ef2b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319202025-03-07T23:31:07.861ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7bda116f-160a-4128-8774-35640da7ef2b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319212025-03-07T23:31:07.861ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7bda116f-160a-4128-8774-35640da7ef2b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319222025-03-07T23:31:07.861ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 536 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 7bda116f-160a-4128-8774-35640da7ef2b response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319232025-03-07T23:31:07.862ZINFOtest_unauthorized (external client test context): client received response status = 401
319242025-03-07T23:31:07.862ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319252025-03-07T23:31:07.862ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319262025-03-07T23:31:07.862ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fc2b807c-6dc2-489c-bc00-54f9ef3229cb uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319272025-03-07T23:31:07.862ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fc2b807c-6dc2-489c-bc00-54f9ef3229cb uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319282025-03-07T23:31:07.864ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3272:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3292:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::AntiAffinityGroupUpdate>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::AntiAffinityGroup>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fc2b807c-6dc2-489c-bc00-54f9ef3229cb uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319292025-03-07T23:31:07.864ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1171 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fc2b807c-6dc2-489c-bc00-54f9ef3229cb response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319302025-03-07T23:31:07.864ZINFOtest_unauthorized (external client test context): client received response status = 401
319312025-03-07T23:31:07.864ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319322025-03-07T23:31:07.864ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319332025-03-07T23:31:07.864ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6cc19c61-3483-44b3-8c54-2572ecae7381 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319342025-03-07T23:31:07.864ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 6cc19c61-3483-44b3-8c54-2572ecae7381 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319352025-03-07T23:31:07.864ZINFOtest_unauthorized (external client test context): client received response status = 405
319362025-03-07T23:31:07.864ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319372025-03-07T23:31:07.864ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319382025-03-07T23:31:07.864ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = eeeee4fd-8b3a-42fc-9505-992561491323 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319392025-03-07T23:31:07.864ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = eeeee4fd-8b3a-42fc-9505-992561491323 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319402025-03-07T23:31:07.864ZINFOtest_unauthorized (external client test context): client received response status = 405
319412025-03-07T23:31:07.865ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319422025-03-07T23:31:07.865ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319432025-03-07T23:31:07.865ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = daa820ce-d195-4ac4-b7a5-3a02f28cdb07 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319442025-03-07T23:31:07.865ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = daa820ce-d195-4ac4-b7a5-3a02f28cdb07 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319452025-03-07T23:31:07.865ZINFOtest_unauthorized (external client test context): client received response status = 405
319462025-03-07T23:31:07.865ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319472025-03-07T23:31:07.865ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319482025-03-07T23:31:07.865ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e3d4c5b9-8d63-47fe-93d9-3429b7714db3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319492025-03-07T23:31:07.865ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e3d4c5b9-8d63-47fe-93d9-3429b7714db3 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319502025-03-07T23:31:07.866ZINFOtest_unauthorized (external client test context): client received response status = 405
319512025-03-07T23:31:07.866ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319522025-03-07T23:31:07.866ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319532025-03-07T23:31:07.866ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319542025-03-07T23:31:07.866ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319552025-03-07T23:31:07.866ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319562025-03-07T23:31:07.866ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319572025-03-07T23:31:07.866ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319582025-03-07T23:31:07.867ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319592025-03-07T23:31:07.878ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319602025-03-07T23:31:07.878ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319612025-03-07T23:31:07.879ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319622025-03-07T23:31:07.894ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
319632025-03-07T23:31:07.894ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
319642025-03-07T23:31:07.894ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319652025-03-07T23:31:07.894ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319662025-03-07T23:31:07.895ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319672025-03-07T23:31:07.900ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
319682025-03-07T23:31:07.900ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319692025-03-07T23:31:07.900ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319702025-03-07T23:31:07.900ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319712025-03-07T23:31:07.907ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
319722025-03-07T23:31:07.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
319732025-03-07T23:31:07.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319742025-03-07T23:31:07.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319752025-03-07T23:31:07.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319762025-03-07T23:31:07.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
319772025-03-07T23:31:07.922ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
319782025-03-07T23:31:07.922ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319792025-03-07T23:31:07.922ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319802025-03-07T23:31:07.923ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319812025-03-07T23:31:07.924ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
319822025-03-07T23:31:07.925ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
319832025-03-07T23:31:07.925ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
319842025-03-07T23:31:07.925ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
319852025-03-07T23:31:07.936ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
319862025-03-07T23:31:07.939ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
319872025-03-07T23:31:07.939ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319882025-03-07T23:31:07.939ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319892025-03-07T23:31:07.939ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319902025-03-07T23:31:07.940ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319912025-03-07T23:31:07.974ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319922025-03-07T23:31:07.974ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319932025-03-07T23:31:07.981ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319942025-03-07T23:31:07.985ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319952025-03-07T23:31:08.009ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319962025-03-07T23:31:08.010ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319972025-03-07T23:31:08.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319982025-03-07T23:31:08.024ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
319992025-03-07T23:31:08.024ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320002025-03-07T23:31:08.024ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320012025-03-07T23:31:08.024ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320022025-03-07T23:31:08.031ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320032025-03-07T23:31:08.031ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320042025-03-07T23:31:08.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320052025-03-07T23:31:08.031ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320062025-03-07T23:31:08.031ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320072025-03-07T23:31:08.031ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320082025-03-07T23:31:08.031ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320092025-03-07T23:31:08.031ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320102025-03-07T23:31:08.041ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320112025-03-07T23:31:08.099ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320122025-03-07T23:31:08.099ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 233017 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c4a12ac5-6a5c-4dde-918d-31e85be55683 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320132025-03-07T23:31:08.104ZINFOtest_unauthorized (external client test context): client received response status = 404
320142025-03-07T23:31:08.104ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320152025-03-07T23:31:08.104ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320162025-03-07T23:31:08.104ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c594970-8faa-4cca-94a6-30601ff4c872 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320172025-03-07T23:31:08.105ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c594970-8faa-4cca-94a6-30601ff4c872 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320182025-03-07T23:31:08.105ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c594970-8faa-4cca-94a6-30601ff4c872 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320192025-03-07T23:31:08.105ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c594970-8faa-4cca-94a6-30601ff4c872 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320202025-03-07T23:31:08.105ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 851 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5c594970-8faa-4cca-94a6-30601ff4c872 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320212025-03-07T23:31:08.106ZINFOtest_unauthorized (external client test context): client received response status = 401
320222025-03-07T23:31:08.107ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320232025-03-07T23:31:08.107ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320242025-03-07T23:31:08.108ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7f1e920b-a6ca-4558-a6ba-c7af034b68a9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320252025-03-07T23:31:08.108ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7f1e920b-a6ca-4558-a6ba-c7af034b68a9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320262025-03-07T23:31:08.108ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7f1e920b-a6ca-4558-a6ba-c7af034b68a9 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320272025-03-07T23:31:08.108ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 259 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7f1e920b-a6ca-4558-a6ba-c7af034b68a9 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320282025-03-07T23:31:08.109ZINFOtest_unauthorized (external client test context): client received response status = 401
320292025-03-07T23:31:08.109ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320302025-03-07T23:31:08.109ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320312025-03-07T23:31:08.109ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 02c106ce-32a2-4801-80bf-7b088415ecd6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320322025-03-07T23:31:08.109ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 02c106ce-32a2-4801-80bf-7b088415ecd6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320332025-03-07T23:31:08.115ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3303:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3320:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 02c106ce-32a2-4801-80bf-7b088415ecd6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320342025-03-07T23:31:08.116ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5942 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 02c106ce-32a2-4801-80bf-7b088415ecd6 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320352025-03-07T23:31:08.116ZINFOtest_unauthorized (external client test context): client received response status = 401
320362025-03-07T23:31:08.116ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320372025-03-07T23:31:08.116ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320382025-03-07T23:31:08.124ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1f438b41-6543-41e7-b9cb-88c11ca89734 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320392025-03-07T23:31:08.124ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 107 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1f438b41-6543-41e7-b9cb-88c11ca89734 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320402025-03-07T23:31:08.124ZINFOtest_unauthorized (external client test context): client received response status = 405
320412025-03-07T23:31:08.124ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320422025-03-07T23:31:08.124ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320432025-03-07T23:31:08.124ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 116f1b5e-6142-411d-816b-387a5a86a4a4 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320442025-03-07T23:31:08.125ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 116f1b5e-6142-411d-816b-387a5a86a4a4 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320452025-03-07T23:31:08.125ZINFOtest_unauthorized (external client test context): client received response status = 405
320462025-03-07T23:31:08.125ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320472025-03-07T23:31:08.125ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320482025-03-07T23:31:08.126ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 921ef709-1426-4d99-801f-96b4bbe5522d uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320492025-03-07T23:31:08.126ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 484 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 921ef709-1426-4d99-801f-96b4bbe5522d response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320502025-03-07T23:31:08.127ZINFOtest_unauthorized (external client test context): client received response status = 405
320512025-03-07T23:31:08.127ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320522025-03-07T23:31:08.127ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320532025-03-07T23:31:08.127ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2affcc80-e13f-4884-aaa6-0334a40ea91b uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320542025-03-07T23:31:08.127ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2affcc80-e13f-4884-aaa6-0334a40ea91b response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320552025-03-07T23:31:08.128ZINFOtest_unauthorized (external client test context): client received response status = 405
320562025-03-07T23:31:08.128ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320572025-03-07T23:31:08.128ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320582025-03-07T23:31:08.128ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320592025-03-07T23:31:08.128ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320602025-03-07T23:31:08.128ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
320612025-03-07T23:31:08.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320622025-03-07T23:31:08.128ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320632025-03-07T23:31:08.129ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320642025-03-07T23:31:08.164ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320652025-03-07T23:31:08.164ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320662025-03-07T23:31:08.165ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320672025-03-07T23:31:08.165ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
320682025-03-07T23:31:08.165ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
320692025-03-07T23:31:08.165ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
320702025-03-07T23:31:08.166ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
320712025-03-07T23:31:08.168ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
320722025-03-07T23:31:08.168ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
320732025-03-07T23:31:08.168ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320742025-03-07T23:31:08.168ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320752025-03-07T23:31:08.169ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320762025-03-07T23:31:08.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
320772025-03-07T23:31:08.172ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
320782025-03-07T23:31:08.182ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
320792025-03-07T23:31:08.182ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320802025-03-07T23:31:08.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320812025-03-07T23:31:08.183ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320822025-03-07T23:31:08.185ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
320832025-03-07T23:31:08.185ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
320842025-03-07T23:31:08.191ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
320852025-03-07T23:31:08.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
320862025-03-07T23:31:08.196ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320872025-03-07T23:31:08.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320882025-03-07T23:31:08.196ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320892025-03-07T23:31:08.215ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
320902025-03-07T23:31:08.215ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
320912025-03-07T23:31:08.215ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320922025-03-07T23:31:08.215ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320932025-03-07T23:31:08.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320942025-03-07T23:31:08.224ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
320952025-03-07T23:31:08.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
320962025-03-07T23:31:08.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
320972025-03-07T23:31:08.224ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
320982025-03-07T23:31:08.227ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
320992025-03-07T23:31:08.230ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
321002025-03-07T23:31:08.230ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321012025-03-07T23:31:08.230ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321022025-03-07T23:31:08.230ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321032025-03-07T23:31:08.231ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321042025-03-07T23:31:08.234ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321052025-03-07T23:31:08.234ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321062025-03-07T23:31:08.234ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321072025-03-07T23:31:08.238ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321082025-03-07T23:31:08.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321092025-03-07T23:31:08.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321102025-03-07T23:31:08.249ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321112025-03-07T23:31:08.249ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321122025-03-07T23:31:08.249ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321132025-03-07T23:31:08.249ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321142025-03-07T23:31:08.251ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321152025-03-07T23:31:08.255ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321162025-03-07T23:31:08.255ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321172025-03-07T23:31:08.255ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321182025-03-07T23:31:08.256ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321192025-03-07T23:31:08.259ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321202025-03-07T23:31:08.259ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321212025-03-07T23:31:08.259ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321222025-03-07T23:31:08.259ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321232025-03-07T23:31:08.262ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321242025-03-07T23:31:08.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321252025-03-07T23:31:08.292ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 163858 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5d25aac5-b07b-4554-bb42-7937a71bb8f6 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group?project=demo-project
321262025-03-07T23:31:08.292ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
321272025-03-07T23:31:08.293ZINFOtest_unauthorized (external client test context): client received response status = 200
321282025-03-07T23:31:08.294ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321292025-03-07T23:31:08.294ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321302025-03-07T23:31:08.294ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321312025-03-07T23:31:08.295ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321322025-03-07T23:31:08.296ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321332025-03-07T23:31:08.296ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321342025-03-07T23:31:08.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321352025-03-07T23:31:08.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321362025-03-07T23:31:08.301ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321372025-03-07T23:31:08.319ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321382025-03-07T23:31:08.319ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321392025-03-07T23:31:08.320ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321402025-03-07T23:31:08.334ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
321412025-03-07T23:31:08.335ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
321422025-03-07T23:31:08.335ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321432025-03-07T23:31:08.335ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321442025-03-07T23:31:08.336ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321452025-03-07T23:31:08.339ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
321462025-03-07T23:31:08.339ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321472025-03-07T23:31:08.340ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321482025-03-07T23:31:08.341ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321492025-03-07T23:31:08.343ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
321502025-03-07T23:31:08.364ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
321512025-03-07T23:31:08.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321522025-03-07T23:31:08.364ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321532025-03-07T23:31:08.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321542025-03-07T23:31:08.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
321552025-03-07T23:31:08.429ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
321562025-03-07T23:31:08.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321572025-03-07T23:31:08.429ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321582025-03-07T23:31:08.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321592025-03-07T23:31:08.440ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
321602025-03-07T23:31:08.442ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
321612025-03-07T23:31:08.462ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
321622025-03-07T23:31:08.463ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
321632025-03-07T23:31:08.466ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
321642025-03-07T23:31:08.470ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
321652025-03-07T23:31:08.470ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321662025-03-07T23:31:08.472ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321672025-03-07T23:31:08.472ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321682025-03-07T23:31:08.473ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321692025-03-07T23:31:08.483ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
321702025-03-07T23:31:08.483ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
321712025-03-07T23:31:08.483ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
321722025-03-07T23:31:08.483ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
321732025-03-07T23:31:08.483ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
321742025-03-07T23:31:08.483ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
321752025-03-07T23:31:08.486ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321762025-03-07T23:31:08.486ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321772025-03-07T23:31:08.487ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321782025-03-07T23:31:08.511ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321792025-03-07T23:31:08.511ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321802025-03-07T23:31:08.512ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321812025-03-07T23:31:08.536ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321822025-03-07T23:31:08.536ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321832025-03-07T23:31:08.536ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321842025-03-07T23:31:08.536ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321852025-03-07T23:31:08.537ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321862025-03-07T23:31:08.541ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321872025-03-07T23:31:08.542ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321882025-03-07T23:31:08.542ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321892025-03-07T23:31:08.544ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321902025-03-07T23:31:08.550ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321912025-03-07T23:31:08.550ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321922025-03-07T23:31:08.550ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321932025-03-07T23:31:08.551ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321942025-03-07T23:31:08.560ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321952025-03-07T23:31:08.568ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321962025-03-07T23:31:08.573ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321972025-03-07T23:31:08.573ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321982025-03-07T23:31:08.574ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
321992025-03-07T23:31:08.574ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322002025-03-07T23:31:08.575ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322012025-03-07T23:31:08.576ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
322022025-03-07T23:31:08.576ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
322032025-03-07T23:31:08.580ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322042025-03-07T23:31:08.581ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322052025-03-07T23:31:08.581ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322062025-03-07T23:31:08.582ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322072025-03-07T23:31:08.633ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
322082025-03-07T23:31:08.634ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
322092025-03-07T23:31:08.634ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
322102025-03-07T23:31:08.634ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
322112025-03-07T23:31:08.635ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322122025-03-07T23:31:08.636ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322132025-03-07T23:31:08.638ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322142025-03-07T23:31:08.638ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322152025-03-07T23:31:08.651ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322162025-03-07T23:31:08.667ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322172025-03-07T23:31:08.667ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322182025-03-07T23:31:08.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322192025-03-07T23:31:08.669ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322202025-03-07T23:31:08.691ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 395674 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcd21417-308e-4917-9f0d-4303005e7b4d response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322212025-03-07T23:31:08.691ZINFOtest_unauthorized (external client test context): client received response status = 200
322222025-03-07T23:31:08.694ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322232025-03-07T23:31:08.694ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322242025-03-07T23:31:08.694ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322252025-03-07T23:31:08.695ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322262025-03-07T23:31:08.695ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322272025-03-07T23:31:08.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322282025-03-07T23:31:08.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322292025-03-07T23:31:08.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322302025-03-07T23:31:08.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322312025-03-07T23:31:08.709ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322322025-03-07T23:31:08.720ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322332025-03-07T23:31:08.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
322342025-03-07T23:31:08.736ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
322352025-03-07T23:31:08.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322362025-03-07T23:31:08.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322372025-03-07T23:31:08.737ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322382025-03-07T23:31:08.765ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
322392025-03-07T23:31:08.765ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322402025-03-07T23:31:08.765ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322412025-03-07T23:31:08.766ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322422025-03-07T23:31:08.770ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
322432025-03-07T23:31:08.774ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
322442025-03-07T23:31:08.774ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322452025-03-07T23:31:08.774ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322462025-03-07T23:31:08.775ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322472025-03-07T23:31:08.790ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
322482025-03-07T23:31:08.790ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
322492025-03-07T23:31:08.790ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322502025-03-07T23:31:08.790ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322512025-03-07T23:31:08.791ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322522025-03-07T23:31:08.798ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
322532025-03-07T23:31:08.798ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
322542025-03-07T23:31:08.798ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
322552025-03-07T23:31:08.798ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
322562025-03-07T23:31:08.806ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
322572025-03-07T23:31:08.850ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
322582025-03-07T23:31:08.850ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322592025-03-07T23:31:08.850ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322602025-03-07T23:31:08.850ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322612025-03-07T23:31:08.850ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322622025-03-07T23:31:08.867ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322632025-03-07T23:31:08.867ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322642025-03-07T23:31:08.868ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322652025-03-07T23:31:08.875ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322662025-03-07T23:31:08.875ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322672025-03-07T23:31:08.875ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322682025-03-07T23:31:08.879ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322692025-03-07T23:31:08.879ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322702025-03-07T23:31:08.879ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322712025-03-07T23:31:08.879ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322722025-03-07T23:31:08.880ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322732025-03-07T23:31:08.891ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322742025-03-07T23:31:08.891ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322752025-03-07T23:31:08.891ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322762025-03-07T23:31:08.892ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322772025-03-07T23:31:08.904ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322782025-03-07T23:31:08.904ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322792025-03-07T23:31:08.905ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322802025-03-07T23:31:08.905ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322812025-03-07T23:31:08.911ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322822025-03-07T23:31:08.971ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322832025-03-07T23:31:08.972ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 277315 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7bc82943-e317-4c86-aad1-ad2b9ebe4c52 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322842025-03-07T23:31:08.974ZINFOtest_unauthorized (external client test context): client received response status = 404
322852025-03-07T23:31:08.974ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322862025-03-07T23:31:08.974ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322872025-03-07T23:31:08.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d67630a-fb8b-469a-9aa0-e9ed711471a1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322882025-03-07T23:31:08.975ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d67630a-fb8b-469a-9aa0-e9ed711471a1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322892025-03-07T23:31:08.975ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d67630a-fb8b-469a-9aa0-e9ed711471a1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322902025-03-07T23:31:08.975ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d67630a-fb8b-469a-9aa0-e9ed711471a1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322912025-03-07T23:31:08.976ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 907 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6d67630a-fb8b-469a-9aa0-e9ed711471a1 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322922025-03-07T23:31:08.976ZINFOtest_unauthorized (external client test context): client received response status = 401
322932025-03-07T23:31:08.976ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322942025-03-07T23:31:08.976ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322952025-03-07T23:31:08.980ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8d7d987-908a-4032-99af-92ebd651ca43 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322962025-03-07T23:31:08.980ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8d7d987-908a-4032-99af-92ebd651ca43 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322972025-03-07T23:31:08.980ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8d7d987-908a-4032-99af-92ebd651ca43 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322982025-03-07T23:31:08.981ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1102 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c8d7d987-908a-4032-99af-92ebd651ca43 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
322992025-03-07T23:31:08.981ZINFOtest_unauthorized (external client test context): client received response status = 401
323002025-03-07T23:31:08.981ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323012025-03-07T23:31:08.981ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323022025-03-07T23:31:08.981ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c79f7376-68af-4dc1-8c35-f8a2eefe7982 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323032025-03-07T23:31:08.981ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c79f7376-68af-4dc1-8c35-f8a2eefe7982 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323042025-03-07T23:31:08.987ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2925:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AntiAffinityGroupMember>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2956:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AntiAffinityGroupMember>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityGroupPath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::AntiAffinityGroupMember>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c79f7376-68af-4dc1-8c35-f8a2eefe7982 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323052025-03-07T23:31:08.987ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 5256 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c79f7376-68af-4dc1-8c35-f8a2eefe7982 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323062025-03-07T23:31:08.987ZINFOtest_unauthorized (external client test context): client received response status = 401
323072025-03-07T23:31:08.987ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323082025-03-07T23:31:08.987ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323092025-03-07T23:31:08.987ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d3b15461-804f-41e9-92e7-797ea75517e6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323102025-03-07T23:31:08.987ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d3b15461-804f-41e9-92e7-797ea75517e6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323112025-03-07T23:31:08.987ZINFOtest_unauthorized (external client test context): client received response status = 405
323122025-03-07T23:31:08.987ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323132025-03-07T23:31:08.987ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323142025-03-07T23:31:08.988ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 37f0470b-d80c-4b3c-8683-2eee7d011732 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323152025-03-07T23:31:08.988ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 37f0470b-d80c-4b3c-8683-2eee7d011732 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323162025-03-07T23:31:08.988ZINFOtest_unauthorized (external client test context): client received response status = 405
323172025-03-07T23:31:08.988ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323182025-03-07T23:31:08.988ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323192025-03-07T23:31:08.988ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = df959dae-82e4-4fc9-a686-79faac717fa6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323202025-03-07T23:31:08.988ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = df959dae-82e4-4fc9-a686-79faac717fa6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323212025-03-07T23:31:08.988ZINFOtest_unauthorized (external client test context): client received response status = 405
323222025-03-07T23:31:08.988ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323232025-03-07T23:31:08.989ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323242025-03-07T23:31:08.989ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00244e4d-4fb6-4b9b-8c03-178445643915 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323252025-03-07T23:31:08.989ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 00244e4d-4fb6-4b9b-8c03-178445643915 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323262025-03-07T23:31:08.989ZINFOtest_unauthorized (external client test context): client received response status = 405
323272025-03-07T23:31:08.989ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323282025-03-07T23:31:08.989ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323292025-03-07T23:31:08.990ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1beaaa6e-2efa-4dea-9d49-ac8cedd3711e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323302025-03-07T23:31:08.990ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 248 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1beaaa6e-2efa-4dea-9d49-ac8cedd3711e response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323312025-03-07T23:31:08.990ZINFOtest_unauthorized (external client test context): client received response status = 405
323322025-03-07T23:31:08.991ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323332025-03-07T23:31:08.994ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323342025-03-07T23:31:08.994ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40ba2655-5028-42b0-9443-5e91cbebed39 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323352025-03-07T23:31:08.994ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 167 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 40ba2655-5028-42b0-9443-5e91cbebed39 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323362025-03-07T23:31:08.995ZINFOtest_unauthorized (external client test context): client received response status = 405
323372025-03-07T23:31:08.995ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323382025-03-07T23:31:08.995ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323392025-03-07T23:31:08.995ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d55796e3-6756-42ac-b75d-84cf05a328ff uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323402025-03-07T23:31:08.995ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 182 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d55796e3-6756-42ac-b75d-84cf05a328ff response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323412025-03-07T23:31:08.996ZINFOtest_unauthorized (external client test context): client received response status = 405
323422025-03-07T23:31:08.996ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323432025-03-07T23:31:08.996ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323442025-03-07T23:31:08.997ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 46ff1952-6df1-43c0-aa37-bfd6f27a3c0b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323452025-03-07T23:31:08.997ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 196 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 46ff1952-6df1-43c0-aa37-bfd6f27a3c0b response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323462025-03-07T23:31:08.997ZINFOtest_unauthorized (external client test context): client received response status = 405
323472025-03-07T23:31:08.999ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323482025-03-07T23:31:08.999ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323492025-03-07T23:31:08.999ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3efff8a0-d55d-4903-bb22-ea9904aba616 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323502025-03-07T23:31:09.001ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1380 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3efff8a0-d55d-4903-bb22-ea9904aba616 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323512025-03-07T23:31:09.001ZINFOtest_unauthorized (external client test context): client received response status = 405
323522025-03-07T23:31:09.001ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323532025-03-07T23:31:09.001ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323542025-03-07T23:31:09.002ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e78a95e5-abe3-4e5d-92bf-8b5cfd8cb870 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323552025-03-07T23:31:09.003ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 999 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e78a95e5-abe3-4e5d-92bf-8b5cfd8cb870 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323562025-03-07T23:31:09.003ZINFOtest_unauthorized (external client test context): client received response status = 405
323572025-03-07T23:31:09.003ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323582025-03-07T23:31:09.003ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323592025-03-07T23:31:09.004ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2fdc1c76-1135-4db6-bba8-b954d9e3c53c uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323602025-03-07T23:31:09.004ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 153 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2fdc1c76-1135-4db6-bba8-b954d9e3c53c response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323612025-03-07T23:31:09.004ZINFOtest_unauthorized (external client test context): client received response status = 405
323622025-03-07T23:31:09.004ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323632025-03-07T23:31:09.004ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323642025-03-07T23:31:09.005ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8ee7c611-9624-4a07-b73e-674163abc36a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323652025-03-07T23:31:09.005ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8ee7c611-9624-4a07-b73e-674163abc36a response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323662025-03-07T23:31:09.005ZINFOtest_unauthorized (external client test context): client received response status = 405
323672025-03-07T23:31:09.006ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323682025-03-07T23:31:09.006ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323692025-03-07T23:31:09.007ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 79b3ac28-b3cb-4df3-84e1-bfea53163e0a uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323702025-03-07T23:31:09.007ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 166 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 79b3ac28-b3cb-4df3-84e1-bfea53163e0a response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323712025-03-07T23:31:09.007ZINFOtest_unauthorized (external client test context): client received response status = 405
323722025-03-07T23:31:09.007ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323732025-03-07T23:31:09.008ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323742025-03-07T23:31:09.008ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d909317-0922-4b46-ba52-d86ad96d9a88 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323752025-03-07T23:31:09.009ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 145 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9d909317-0922-4b46-ba52-d86ad96d9a88 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323762025-03-07T23:31:09.009ZINFOtest_unauthorized (external client test context): client received response status = 405
323772025-03-07T23:31:09.010ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323782025-03-07T23:31:09.010ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323792025-03-07T23:31:09.010ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a9188a01-d9f6-4a2b-9033-61c372f138ff uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323802025-03-07T23:31:09.011ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1140 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a9188a01-d9f6-4a2b-9033-61c372f138ff response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323812025-03-07T23:31:09.011ZINFOtest_unauthorized (external client test context): client received response status = 405
323822025-03-07T23:31:09.012ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323832025-03-07T23:31:09.012ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323842025-03-07T23:31:09.013ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f24ff6de-2f85-4c6e-9c99-c386b6c2cfc0 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323852025-03-07T23:31:09.018ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 171 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f24ff6de-2f85-4c6e-9c99-c386b6c2cfc0 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323862025-03-07T23:31:09.018ZINFOtest_unauthorized (external client test context): client received response status = 405
323872025-03-07T23:31:09.018ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323882025-03-07T23:31:09.020ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323892025-03-07T23:31:09.020ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323902025-03-07T23:31:09.020ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323912025-03-07T23:31:09.020ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
323922025-03-07T23:31:09.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323932025-03-07T23:31:09.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323942025-03-07T23:31:09.020ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323952025-03-07T23:31:09.023ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
323962025-03-07T23:31:09.023ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
323972025-03-07T23:31:09.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
323982025-03-07T23:31:09.026ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
323992025-03-07T23:31:09.026ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
324002025-03-07T23:31:09.026ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324012025-03-07T23:31:09.026ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324022025-03-07T23:31:09.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324032025-03-07T23:31:09.029ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
324042025-03-07T23:31:09.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324052025-03-07T23:31:09.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324062025-03-07T23:31:09.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324072025-03-07T23:31:09.032ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
324082025-03-07T23:31:09.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
324092025-03-07T23:31:09.054ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324102025-03-07T23:31:09.055ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324112025-03-07T23:31:09.055ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324122025-03-07T23:31:09.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
324132025-03-07T23:31:09.058ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
324142025-03-07T23:31:09.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324152025-03-07T23:31:09.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324162025-03-07T23:31:09.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324172025-03-07T23:31:09.064ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
324182025-03-07T23:31:09.064ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324192025-03-07T23:31:09.064ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324202025-03-07T23:31:09.065ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324212025-03-07T23:31:09.067ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
324222025-03-07T23:31:09.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
324232025-03-07T23:31:09.071ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324242025-03-07T23:31:09.071ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324252025-03-07T23:31:09.071ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324262025-03-07T23:31:09.071ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324272025-03-07T23:31:09.074ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324282025-03-07T23:31:09.074ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324292025-03-07T23:31:09.077ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324302025-03-07T23:31:09.084ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324312025-03-07T23:31:09.084ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324322025-03-07T23:31:09.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324332025-03-07T23:31:09.088ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
324342025-03-07T23:31:09.090ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
324352025-03-07T23:31:09.090ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
324362025-03-07T23:31:09.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324372025-03-07T23:31:09.090ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324382025-03-07T23:31:09.090ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324392025-03-07T23:31:09.090ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324402025-03-07T23:31:09.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324412025-03-07T23:31:09.095ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324422025-03-07T23:31:09.095ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324432025-03-07T23:31:09.095ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324442025-03-07T23:31:09.096ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324452025-03-07T23:31:09.103ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324462025-03-07T23:31:09.103ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324472025-03-07T23:31:09.103ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324482025-03-07T23:31:09.104ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324492025-03-07T23:31:09.107ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324502025-03-07T23:31:09.130ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324512025-03-07T23:31:09.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324522025-03-07T23:31:09.130ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324532025-03-07T23:31:09.130ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324542025-03-07T23:31:09.130ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324552025-03-07T23:31:09.131ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324562025-03-07T23:31:09.142ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324572025-03-07T23:31:09.142ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324582025-03-07T23:31:09.143ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324592025-03-07T23:31:09.144ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324602025-03-07T23:31:09.151ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324612025-03-07T23:31:09.151ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324622025-03-07T23:31:09.151ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324632025-03-07T23:31:09.152ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324642025-03-07T23:31:09.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324652025-03-07T23:31:09.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324662025-03-07T23:31:09.165ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324672025-03-07T23:31:09.165ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324682025-03-07T23:31:09.166ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324692025-03-07T23:31:09.167ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
324702025-03-07T23:31:09.168ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
324712025-03-07T23:31:09.168ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
324722025-03-07T23:31:09.169ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
324732025-03-07T23:31:09.173ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 153601 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b4d6f7c5-85cc-4bdc-a849-bba3033f96a3 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members?project=demo-project
324742025-03-07T23:31:09.173ZINFOtest_unauthorized (external client test context): client received response status = 200
324752025-03-07T23:31:09.173ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
324762025-03-07T23:31:09.174ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
324772025-03-07T23:31:09.174ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
324782025-03-07T23:31:09.174ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
324792025-03-07T23:31:09.174ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
324802025-03-07T23:31:09.174ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
324812025-03-07T23:31:09.174ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324822025-03-07T23:31:09.174ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324832025-03-07T23:31:09.175ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324842025-03-07T23:31:09.176ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
324852025-03-07T23:31:09.176ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
324862025-03-07T23:31:09.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324872025-03-07T23:31:09.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324882025-03-07T23:31:09.180ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324892025-03-07T23:31:09.181ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
324902025-03-07T23:31:09.181ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
324912025-03-07T23:31:09.182ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
324922025-03-07T23:31:09.182ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
324932025-03-07T23:31:09.183ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324942025-03-07T23:31:09.183ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324952025-03-07T23:31:09.183ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
324962025-03-07T23:31:09.192ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
324972025-03-07T23:31:09.193ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
324982025-03-07T23:31:09.193ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
324992025-03-07T23:31:09.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325002025-03-07T23:31:09.196ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
325012025-03-07T23:31:09.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
325022025-03-07T23:31:09.200ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325032025-03-07T23:31:09.200ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325042025-03-07T23:31:09.201ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325052025-03-07T23:31:09.203ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
325062025-03-07T23:31:09.203ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
325072025-03-07T23:31:09.203ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325082025-03-07T23:31:09.203ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325092025-03-07T23:31:09.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325102025-03-07T23:31:09.206ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
325112025-03-07T23:31:09.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325122025-03-07T23:31:09.206ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325132025-03-07T23:31:09.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325142025-03-07T23:31:09.216ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
325152025-03-07T23:31:09.216ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
325162025-03-07T23:31:09.216ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325172025-03-07T23:31:09.216ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325182025-03-07T23:31:09.216ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325192025-03-07T23:31:09.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325202025-03-07T23:31:09.220ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325212025-03-07T23:31:09.220ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325222025-03-07T23:31:09.221ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325232025-03-07T23:31:09.223ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325242025-03-07T23:31:09.223ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325252025-03-07T23:31:09.224ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325262025-03-07T23:31:09.227ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325272025-03-07T23:31:09.228ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325282025-03-07T23:31:09.228ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325292025-03-07T23:31:09.228ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325302025-03-07T23:31:09.229ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325312025-03-07T23:31:09.231ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325322025-03-07T23:31:09.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325332025-03-07T23:31:09.231ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325342025-03-07T23:31:09.233ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325352025-03-07T23:31:09.236ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325362025-03-07T23:31:09.236ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325372025-03-07T23:31:09.236ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325382025-03-07T23:31:09.237ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325392025-03-07T23:31:09.241ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325402025-03-07T23:31:09.253ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325412025-03-07T23:31:09.253ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325422025-03-07T23:31:09.253ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325432025-03-07T23:31:09.253ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325442025-03-07T23:31:09.256ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325452025-03-07T23:31:09.256ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325462025-03-07T23:31:09.257ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325472025-03-07T23:31:09.260ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325482025-03-07T23:31:09.260ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325492025-03-07T23:31:09.261ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325502025-03-07T23:31:09.265ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325512025-03-07T23:31:09.265ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325522025-03-07T23:31:09.265ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325532025-03-07T23:31:09.265ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325542025-03-07T23:31:09.266ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325552025-03-07T23:31:09.270ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
325562025-03-07T23:31:09.270ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325572025-03-07T23:31:09.270ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325582025-03-07T23:31:09.270ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325592025-03-07T23:31:09.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325602025-03-07T23:31:09.283ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325612025-03-07T23:31:09.283ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325622025-03-07T23:31:09.283ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325632025-03-07T23:31:09.290ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325642025-03-07T23:31:09.295ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325652025-03-07T23:31:09.306ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325662025-03-07T23:31:09.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325672025-03-07T23:31:09.306ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325682025-03-07T23:31:09.306ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325692025-03-07T23:31:09.306ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325702025-03-07T23:31:09.307ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325712025-03-07T23:31:09.317ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325722025-03-07T23:31:09.318ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325732025-03-07T23:31:09.318ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325742025-03-07T23:31:09.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325752025-03-07T23:31:09.327ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325762025-03-07T23:31:09.328ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325772025-03-07T23:31:09.328ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325782025-03-07T23:31:09.330ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325792025-03-07T23:31:09.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325802025-03-07T23:31:09.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325812025-03-07T23:31:09.347ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325822025-03-07T23:31:09.347ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325832025-03-07T23:31:09.348ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325842025-03-07T23:31:09.356ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 182545 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 65045e07-82a8-4941-8fde-50fd04dd2979 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325852025-03-07T23:31:09.357ZINFOtest_unauthorized (external client test context): client received response status = 200
325862025-03-07T23:31:09.358ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325872025-03-07T23:31:09.358ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325882025-03-07T23:31:09.358ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325892025-03-07T23:31:09.358ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325902025-03-07T23:31:09.358ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
325912025-03-07T23:31:09.358ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325922025-03-07T23:31:09.358ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325932025-03-07T23:31:09.359ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325942025-03-07T23:31:09.361ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
325952025-03-07T23:31:09.361ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
325962025-03-07T23:31:09.363ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
325972025-03-07T23:31:09.365ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
325982025-03-07T23:31:09.366ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
325992025-03-07T23:31:09.366ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326002025-03-07T23:31:09.366ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326012025-03-07T23:31:09.366ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326022025-03-07T23:31:09.371ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
326032025-03-07T23:31:09.371ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326042025-03-07T23:31:09.371ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326052025-03-07T23:31:09.374ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326062025-03-07T23:31:09.376ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
326072025-03-07T23:31:09.382ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
326082025-03-07T23:31:09.382ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326092025-03-07T23:31:09.382ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326102025-03-07T23:31:09.383ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326112025-03-07T23:31:09.385ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
326122025-03-07T23:31:09.385ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
326132025-03-07T23:31:09.385ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326142025-03-07T23:31:09.385ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326152025-03-07T23:31:09.386ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326162025-03-07T23:31:09.389ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
326172025-03-07T23:31:09.389ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
326182025-03-07T23:31:09.389ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
326192025-03-07T23:31:09.389ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
326202025-03-07T23:31:09.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
326212025-03-07T23:31:09.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
326222025-03-07T23:31:09.396ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326232025-03-07T23:31:09.396ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326242025-03-07T23:31:09.396ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326252025-03-07T23:31:09.397ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326262025-03-07T23:31:09.399ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326272025-03-07T23:31:09.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326282025-03-07T23:31:09.400ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326292025-03-07T23:31:09.402ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326302025-03-07T23:31:09.403ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326312025-03-07T23:31:09.403ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326322025-03-07T23:31:09.407ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326332025-03-07T23:31:09.407ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326342025-03-07T23:31:09.407ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326352025-03-07T23:31:09.407ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326362025-03-07T23:31:09.408ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326372025-03-07T23:31:09.411ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
326382025-03-07T23:31:09.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
326392025-03-07T23:31:09.413ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326402025-03-07T23:31:09.414ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326412025-03-07T23:31:09.414ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326422025-03-07T23:31:09.416ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326432025-03-07T23:31:09.416ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 4f0e37fd-9633-4671-9c46-7e6948e9e150 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
326442025-03-07T23:31:09.417ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 4f0e37fd-9633-4671-9c46-7e6948e9e150 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
326452025-03-07T23:31:09.417ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 4f0e37fd-9633-4671-9c46-7e6948e9e150 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
326462025-03-07T23:31:09.418ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 4f0e37fd-9633-4671-9c46-7e6948e9e150 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
326472025-03-07T23:31:09.427ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326482025-03-07T23:31:09.428ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326492025-03-07T23:31:09.428ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326502025-03-07T23:31:09.429ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326512025-03-07T23:31:09.431ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14190 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 4f0e37fd-9633-4671-9c46-7e6948e9e150 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
326522025-03-07T23:31:09.431ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f0e37fd-9633-4671-9c46-7e6948e9e150", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:09 GMT"} })
326532025-03-07T23:31:09.432ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
326542025-03-07T23:31:09.432ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 188dd504-44f9-4e43-b4cf-ea74720bf73a uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
326552025-03-07T23:31:09.432ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 188dd504-44f9-4e43-b4cf-ea74720bf73a resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
326562025-03-07T23:31:09.432ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 188dd504-44f9-4e43-b4cf-ea74720bf73a roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
326572025-03-07T23:31:09.433ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 188dd504-44f9-4e43-b4cf-ea74720bf73a resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
326582025-03-07T23:31:09.435ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326592025-03-07T23:31:09.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326602025-03-07T23:31:09.450ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 91655 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd679004-f4c6-4b35-b2b8-47e5c78272be response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326612025-03-07T23:31:09.450ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 17680 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 188dd504-44f9-4e43-b4cf-ea74720bf73a response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
326622025-03-07T23:31:09.451ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "188dd504-44f9-4e43-b4cf-ea74720bf73a", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:09 GMT"} })
326632025-03-07T23:31:09.451ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
326642025-03-07T23:31:09.451ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
326652025-03-07T23:31:09.451ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
326662025-03-07T23:31:09.451ZINFOtest_unauthorized (external client test context): client received response status = 404
326672025-03-07T23:31:09.452ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326682025-03-07T23:31:09.452ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326692025-03-07T23:31:09.452ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2d7985ce-3d0a-4a2f-82a6-5e64cbdd205b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326702025-03-07T23:31:09.453ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2d7985ce-3d0a-4a2f-82a6-5e64cbdd205b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326712025-03-07T23:31:09.453ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2d7985ce-3d0a-4a2f-82a6-5e64cbdd205b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326722025-03-07T23:31:09.453ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2d7985ce-3d0a-4a2f-82a6-5e64cbdd205b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326732025-03-07T23:31:09.453ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 857 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2d7985ce-3d0a-4a2f-82a6-5e64cbdd205b response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326742025-03-07T23:31:09.453ZINFOtest_unauthorized (external client test context): client received response status = 401
326752025-03-07T23:31:09.453ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326762025-03-07T23:31:09.453ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326772025-03-07T23:31:09.453ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f3467fb2-87c9-4214-a7f3-b58fc725ab26 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326782025-03-07T23:31:09.454ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f3467fb2-87c9-4214-a7f3-b58fc725ab26 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326792025-03-07T23:31:09.454ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f3467fb2-87c9-4214-a7f3-b58fc725ab26 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326802025-03-07T23:31:09.454ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 312 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f3467fb2-87c9-4214-a7f3-b58fc725ab26 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326812025-03-07T23:31:09.454ZINFOtest_unauthorized (external client test context): client received response status = 401
326822025-03-07T23:31:09.454ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326832025-03-07T23:31:09.454ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326842025-03-07T23:31:09.454ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 00284933-1644-44f6-8044-1a65ab5369e2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326852025-03-07T23:31:09.454ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 00284933-1644-44f6-8044-1a65ab5369e2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326862025-03-07T23:31:09.456ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2969:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3002:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 00284933-1644-44f6-8044-1a65ab5369e2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326872025-03-07T23:31:09.456ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1212 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 00284933-1644-44f6-8044-1a65ab5369e2 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326882025-03-07T23:31:09.456ZINFOtest_unauthorized (external client test context): client received response status = 401
326892025-03-07T23:31:09.456ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326902025-03-07T23:31:09.456ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326912025-03-07T23:31:09.456ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8608c271-cb2d-4274-9f4d-44c51c7214e3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326922025-03-07T23:31:09.456ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8608c271-cb2d-4274-9f4d-44c51c7214e3 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326932025-03-07T23:31:09.456ZINFOtest_unauthorized (external client test context): client received response status = 405
326942025-03-07T23:31:09.456ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326952025-03-07T23:31:09.456ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326962025-03-07T23:31:09.457ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ac7d3a9d-40b2-4abc-9385-a0639122b5bc uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326972025-03-07T23:31:09.457ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 112 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ac7d3a9d-40b2-4abc-9385-a0639122b5bc response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
326982025-03-07T23:31:09.457ZINFOtest_unauthorized (external client test context): client received response status = 405
326992025-03-07T23:31:09.457ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327002025-03-07T23:31:09.457ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327012025-03-07T23:31:09.457ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 91a0bb86-4ca5-4e5d-a9e6-236b41609ec5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327022025-03-07T23:31:09.457ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 111 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 91a0bb86-4ca5-4e5d-a9e6-236b41609ec5 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327032025-03-07T23:31:09.458ZINFOtest_unauthorized (external client test context): client received response status = 405
327042025-03-07T23:31:09.458ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327052025-03-07T23:31:09.458ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327062025-03-07T23:31:09.458ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efae77fd-2bf0-40b4-be02-3e3c4534a40b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327072025-03-07T23:31:09.458ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 65 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efae77fd-2bf0-40b4-be02-3e3c4534a40b response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327082025-03-07T23:31:09.458ZINFOtest_unauthorized (external client test context): client received response status = 405
327092025-03-07T23:31:09.458ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327102025-03-07T23:31:09.458ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327112025-03-07T23:31:09.458ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327122025-03-07T23:31:09.459ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327132025-03-07T23:31:09.459ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327142025-03-07T23:31:09.459ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327152025-03-07T23:31:09.459ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327162025-03-07T23:31:09.460ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327172025-03-07T23:31:09.465ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327182025-03-07T23:31:09.465ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327192025-03-07T23:31:09.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327202025-03-07T23:31:09.471ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
327212025-03-07T23:31:09.471ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
327222025-03-07T23:31:09.471ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327232025-03-07T23:31:09.473ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327242025-03-07T23:31:09.474ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327252025-03-07T23:31:09.478ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
327262025-03-07T23:31:09.478ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327272025-03-07T23:31:09.478ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327282025-03-07T23:31:09.478ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327292025-03-07T23:31:09.479ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
327302025-03-07T23:31:09.484ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
327312025-03-07T23:31:09.484ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327322025-03-07T23:31:09.484ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327332025-03-07T23:31:09.485ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327342025-03-07T23:31:09.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
327352025-03-07T23:31:09.489ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
327362025-03-07T23:31:09.489ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327372025-03-07T23:31:09.489ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327382025-03-07T23:31:09.490ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327392025-03-07T23:31:09.493ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
327402025-03-07T23:31:09.493ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
327412025-03-07T23:31:09.493ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
327422025-03-07T23:31:09.496ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
327432025-03-07T23:31:09.500ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
327442025-03-07T23:31:09.502ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
327452025-03-07T23:31:09.502ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327462025-03-07T23:31:09.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327472025-03-07T23:31:09.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327482025-03-07T23:31:09.503ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327492025-03-07T23:31:09.505ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327502025-03-07T23:31:09.505ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327512025-03-07T23:31:09.506ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327522025-03-07T23:31:09.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327532025-03-07T23:31:09.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327542025-03-07T23:31:09.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327552025-03-07T23:31:09.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327562025-03-07T23:31:09.512ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327572025-03-07T23:31:09.512ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327582025-03-07T23:31:09.512ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327592025-03-07T23:31:09.512ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327602025-03-07T23:31:09.516ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327612025-03-07T23:31:09.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327622025-03-07T23:31:09.516ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327632025-03-07T23:31:09.517ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327642025-03-07T23:31:09.521ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327652025-03-07T23:31:09.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327662025-03-07T23:31:09.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327672025-03-07T23:31:09.521ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327682025-03-07T23:31:09.524ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327692025-03-07T23:31:09.550ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327702025-03-07T23:31:09.551ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 92222 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 834d4f8e-3d7e-4dac-97f2-6e3148ff6d83 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327712025-03-07T23:31:09.552ZINFOtest_unauthorized (external client test context): client received response status = 404
327722025-03-07T23:31:09.552ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327732025-03-07T23:31:09.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327742025-03-07T23:31:09.552ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f4583d64-b8ca-40e8-960b-01e7c55cd8bd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327752025-03-07T23:31:09.552ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f4583d64-b8ca-40e8-960b-01e7c55cd8bd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327762025-03-07T23:31:09.552ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f4583d64-b8ca-40e8-960b-01e7c55cd8bd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327772025-03-07T23:31:09.552ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f4583d64-b8ca-40e8-960b-01e7c55cd8bd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327782025-03-07T23:31:09.552ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 370 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f4583d64-b8ca-40e8-960b-01e7c55cd8bd response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327792025-03-07T23:31:09.552ZINFOtest_unauthorized (external client test context): client received response status = 401
327802025-03-07T23:31:09.552ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327812025-03-07T23:31:09.552ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327822025-03-07T23:31:09.553ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67baae34-adea-48a5-acb6-9a1bb918931d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327832025-03-07T23:31:09.554ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67baae34-adea-48a5-acb6-9a1bb918931d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327842025-03-07T23:31:09.554ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67baae34-adea-48a5-acb6-9a1bb918931d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327852025-03-07T23:31:09.554ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 218 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67baae34-adea-48a5-acb6-9a1bb918931d response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327862025-03-07T23:31:09.554ZINFOtest_unauthorized (external client test context): client received response status = 401
327872025-03-07T23:31:09.554ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327882025-03-07T23:31:09.554ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327892025-03-07T23:31:09.554ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74c7523e-3926-4a37-a7a4-ecee99e361d3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327902025-03-07T23:31:09.554ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74c7523e-3926-4a37-a7a4-ecee99e361d3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327912025-03-07T23:31:09.555ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3013:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3047:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_add::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74c7523e-3926-4a37-a7a4-ecee99e361d3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327922025-03-07T23:31:09.555ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1061 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 74c7523e-3926-4a37-a7a4-ecee99e361d3 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327932025-03-07T23:31:09.555ZINFOtest_unauthorized (external client test context): client received response status = 401
327942025-03-07T23:31:09.555ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327952025-03-07T23:31:09.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327962025-03-07T23:31:09.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327972025-03-07T23:31:09.555ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327982025-03-07T23:31:09.555ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
327992025-03-07T23:31:09.555ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328002025-03-07T23:31:09.555ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328012025-03-07T23:31:09.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328022025-03-07T23:31:09.560ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328032025-03-07T23:31:09.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328042025-03-07T23:31:09.563ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328052025-03-07T23:31:09.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
328062025-03-07T23:31:09.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
328072025-03-07T23:31:09.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
328082025-03-07T23:31:09.566ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
328092025-03-07T23:31:09.566ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328102025-03-07T23:31:09.566ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328112025-03-07T23:31:09.567ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328122025-03-07T23:31:09.567ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
328132025-03-07T23:31:09.568ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
328142025-03-07T23:31:09.568ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
328152025-03-07T23:31:09.569ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
328162025-03-07T23:31:09.569ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
328172025-03-07T23:31:09.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328182025-03-07T23:31:09.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328192025-03-07T23:31:09.569ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328202025-03-07T23:31:09.573ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
328212025-03-07T23:31:09.576ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
328222025-03-07T23:31:09.576ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328232025-03-07T23:31:09.576ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328242025-03-07T23:31:09.577ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328252025-03-07T23:31:09.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
328262025-03-07T23:31:09.579ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
328272025-03-07T23:31:09.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328282025-03-07T23:31:09.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328292025-03-07T23:31:09.584ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328302025-03-07T23:31:09.586ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
328312025-03-07T23:31:09.586ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
328322025-03-07T23:31:09.587ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
328332025-03-07T23:31:09.587ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
328342025-03-07T23:31:09.591ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
328352025-03-07T23:31:09.596ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
328362025-03-07T23:31:09.596ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328372025-03-07T23:31:09.596ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328382025-03-07T23:31:09.596ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328392025-03-07T23:31:09.597ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328402025-03-07T23:31:09.601ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328412025-03-07T23:31:09.601ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328422025-03-07T23:31:09.601ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328432025-03-07T23:31:09.604ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328442025-03-07T23:31:09.604ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328452025-03-07T23:31:09.604ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328462025-03-07T23:31:09.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328472025-03-07T23:31:09.607ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328482025-03-07T23:31:09.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328492025-03-07T23:31:09.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328502025-03-07T23:31:09.608ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328512025-03-07T23:31:09.612ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328522025-03-07T23:31:09.612ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328532025-03-07T23:31:09.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328542025-03-07T23:31:09.613ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328552025-03-07T23:31:09.617ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328562025-03-07T23:31:09.617ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328572025-03-07T23:31:09.617ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328582025-03-07T23:31:09.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328592025-03-07T23:31:09.622ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328602025-03-07T23:31:09.649ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328612025-03-07T23:31:09.649ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 94158 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5166516f-fff2-4576-a5e9-e549f6cee5b8 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328622025-03-07T23:31:09.650ZINFOtest_unauthorized (external client test context): client received response status = 404
328632025-03-07T23:31:09.650ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328642025-03-07T23:31:09.650ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328652025-03-07T23:31:09.651ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9d7211d1-fdf8-4ab9-9dda-3694966fc20d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328662025-03-07T23:31:09.651ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9d7211d1-fdf8-4ab9-9dda-3694966fc20d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328672025-03-07T23:31:09.651ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9d7211d1-fdf8-4ab9-9dda-3694966fc20d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328682025-03-07T23:31:09.651ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9d7211d1-fdf8-4ab9-9dda-3694966fc20d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328692025-03-07T23:31:09.651ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 466 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9d7211d1-fdf8-4ab9-9dda-3694966fc20d response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328702025-03-07T23:31:09.651ZINFOtest_unauthorized (external client test context): client received response status = 401
328712025-03-07T23:31:09.651ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328722025-03-07T23:31:09.651ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328732025-03-07T23:31:09.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 86e83bda-d527-4123-9ed6-cdd0274657b1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328742025-03-07T23:31:09.652ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 86e83bda-d527-4123-9ed6-cdd0274657b1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328752025-03-07T23:31:09.652ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 86e83bda-d527-4123-9ed6-cdd0274657b1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328762025-03-07T23:31:09.652ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 232 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 86e83bda-d527-4123-9ed6-cdd0274657b1 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328772025-03-07T23:31:09.652ZINFOtest_unauthorized (external client test context): client received response status = 401
328782025-03-07T23:31:09.652ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328792025-03-07T23:31:09.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328802025-03-07T23:31:09.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f10054eb-6019-42f5-bb58-3ad4f524656e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328812025-03-07T23:31:09.653ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f10054eb-6019-42f5-bb58-3ad4f524656e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328822025-03-07T23:31:09.654ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3058:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3092:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_instance_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityInstanceGroupMemberPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f10054eb-6019-42f5-bb58-3ad4f524656e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328832025-03-07T23:31:09.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1238 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f10054eb-6019-42f5-bb58-3ad4f524656e response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328842025-03-07T23:31:09.654ZINFOtest_unauthorized (external client test context): client received response status = 401
328852025-03-07T23:31:09.654ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328862025-03-07T23:31:09.654ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328872025-03-07T23:31:09.654ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6144e1ac-03b7-46b4-9f46-182300dfacfb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328882025-03-07T23:31:09.654ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6144e1ac-03b7-46b4-9f46-182300dfacfb response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328892025-03-07T23:31:09.654ZINFOtest_unauthorized (external client test context): client received response status = 405
328902025-03-07T23:31:09.654ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328912025-03-07T23:31:09.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328922025-03-07T23:31:09.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5dc0b169-7a22-47ff-91a2-c7c632cd0ce6 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328932025-03-07T23:31:09.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 5dc0b169-7a22-47ff-91a2-c7c632cd0ce6 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328942025-03-07T23:31:09.655ZINFOtest_unauthorized (external client test context): client received response status = 405
328952025-03-07T23:31:09.655ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328962025-03-07T23:31:09.655ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328972025-03-07T23:31:09.655ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b7008617-a19c-447d-bc8a-5a9ae1f2a198 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328982025-03-07T23:31:09.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b7008617-a19c-447d-bc8a-5a9ae1f2a198 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
328992025-03-07T23:31:09.655ZINFOtest_unauthorized (external client test context): client received response status = 405
329002025-03-07T23:31:09.656ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329012025-03-07T23:31:09.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329022025-03-07T23:31:09.656ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2ed02b1c-6b04-43b6-a9cd-ec1869053192 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329032025-03-07T23:31:09.656ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2ed02b1c-6b04-43b6-a9cd-ec1869053192 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329042025-03-07T23:31:09.656ZINFOtest_unauthorized (external client test context): client received response status = 405
329052025-03-07T23:31:09.656ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329062025-03-07T23:31:09.656ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329072025-03-07T23:31:09.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329082025-03-07T23:31:09.657ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329092025-03-07T23:31:09.657ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329102025-03-07T23:31:09.657ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329112025-03-07T23:31:09.657ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329122025-03-07T23:31:09.658ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329132025-03-07T23:31:09.661ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329142025-03-07T23:31:09.661ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329152025-03-07T23:31:09.662ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329162025-03-07T23:31:09.664ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
329172025-03-07T23:31:09.664ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
329182025-03-07T23:31:09.664ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329192025-03-07T23:31:09.664ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329202025-03-07T23:31:09.665ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329212025-03-07T23:31:09.667ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
329222025-03-07T23:31:09.667ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329232025-03-07T23:31:09.667ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329242025-03-07T23:31:09.667ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329252025-03-07T23:31:09.670ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
329262025-03-07T23:31:09.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
329272025-03-07T23:31:09.675ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329282025-03-07T23:31:09.675ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329292025-03-07T23:31:09.675ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329302025-03-07T23:31:09.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
329312025-03-07T23:31:09.678ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
329322025-03-07T23:31:09.678ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329332025-03-07T23:31:09.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329342025-03-07T23:31:09.678ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329352025-03-07T23:31:09.681ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
329362025-03-07T23:31:09.681ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
329372025-03-07T23:31:09.681ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
329382025-03-07T23:31:09.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
329392025-03-07T23:31:09.683ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
329402025-03-07T23:31:09.687ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
329412025-03-07T23:31:09.687ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329422025-03-07T23:31:09.687ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329432025-03-07T23:31:09.687ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329442025-03-07T23:31:09.688ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329452025-03-07T23:31:09.690ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329462025-03-07T23:31:09.690ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329472025-03-07T23:31:09.691ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329482025-03-07T23:31:09.694ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329492025-03-07T23:31:09.694ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329502025-03-07T23:31:09.695ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329512025-03-07T23:31:09.696ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329522025-03-07T23:31:09.697ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329532025-03-07T23:31:09.697ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329542025-03-07T23:31:09.697ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329552025-03-07T23:31:09.697ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329562025-03-07T23:31:09.701ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329572025-03-07T23:31:09.701ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329582025-03-07T23:31:09.701ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329592025-03-07T23:31:09.702ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329602025-03-07T23:31:09.705ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329612025-03-07T23:31:09.705ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329622025-03-07T23:31:09.705ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329632025-03-07T23:31:09.705ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329642025-03-07T23:31:09.709ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329652025-03-07T23:31:09.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329662025-03-07T23:31:09.718ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329672025-03-07T23:31:09.718ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329682025-03-07T23:31:09.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329692025-03-07T23:31:09.723ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329702025-03-07T23:31:09.723ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329712025-03-07T23:31:09.724ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329722025-03-07T23:31:09.726ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329732025-03-07T23:31:09.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329742025-03-07T23:31:09.728ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329752025-03-07T23:31:09.731ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329762025-03-07T23:31:09.731ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329772025-03-07T23:31:09.731ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329782025-03-07T23:31:09.731ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329792025-03-07T23:31:09.731ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329802025-03-07T23:31:09.735ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329812025-03-07T23:31:09.735ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329822025-03-07T23:31:09.735ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329832025-03-07T23:31:09.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329842025-03-07T23:31:09.739ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329852025-03-07T23:31:09.739ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329862025-03-07T23:31:09.739ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329872025-03-07T23:31:09.739ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329882025-03-07T23:31:09.747ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329892025-03-07T23:31:09.766ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2c3d0c31-4bb5-4e59-8f87-db5df0d54dc8, lookup_type: ByName("demo-stopped-instance") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329902025-03-07T23:31:09.766ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329912025-03-07T23:31:09.766ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329922025-03-07T23:31:09.766ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329932025-03-07T23:31:09.766ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329942025-03-07T23:31:09.767ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329952025-03-07T23:31:09.786ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329962025-03-07T23:31:09.786ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329972025-03-07T23:31:09.786ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329982025-03-07T23:31:09.787ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
329992025-03-07T23:31:09.791ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330002025-03-07T23:31:09.791ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330012025-03-07T23:31:09.791ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330022025-03-07T23:31:09.792ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330032025-03-07T23:31:09.800ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330042025-03-07T23:31:09.812ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330052025-03-07T23:31:09.812ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330062025-03-07T23:31:09.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330072025-03-07T23:31:09.813ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330082025-03-07T23:31:09.818ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 160680 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a18fb00d-52ce-4778-8d1d-76efdc128ff5 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/instance/demo-stopped-instance?project=demo-project
330092025-03-07T23:31:09.818ZINFOtest_unauthorized (external client test context): client received response status = 200
330102025-03-07T23:31:09.823ZINFOtest_unauthorized: test: begin endpoint url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330112025-03-07T23:31:09.823ZINFOtest_unauthorized: test: privileged GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330122025-03-07T23:31:09.823ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330132025-03-07T23:31:09.823ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330142025-03-07T23:31:09.823ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330152025-03-07T23:31:09.824ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330162025-03-07T23:31:09.824ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330172025-03-07T23:31:09.824ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330182025-03-07T23:31:09.825ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330192025-03-07T23:31:09.827ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330202025-03-07T23:31:09.830ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330212025-03-07T23:31:09.830ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330222025-03-07T23:31:09.830ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
330232025-03-07T23:31:09.830ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
330242025-03-07T23:31:09.830ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330252025-03-07T23:31:09.830ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330262025-03-07T23:31:09.831ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330272025-03-07T23:31:09.833ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
330282025-03-07T23:31:09.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330292025-03-07T23:31:09.833ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330302025-03-07T23:31:09.834ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330312025-03-07T23:31:09.835ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
330322025-03-07T23:31:09.839ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
330332025-03-07T23:31:09.839ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330342025-03-07T23:31:09.839ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330352025-03-07T23:31:09.840ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330362025-03-07T23:31:09.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
330372025-03-07T23:31:09.842ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
330382025-03-07T23:31:09.842ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330392025-03-07T23:31:09.842ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330402025-03-07T23:31:09.842ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330412025-03-07T23:31:09.844ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
330422025-03-07T23:31:09.844ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
330432025-03-07T23:31:09.844ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
330442025-03-07T23:31:09.845ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
330452025-03-07T23:31:09.847ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
330462025-03-07T23:31:09.850ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
330472025-03-07T23:31:09.850ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330482025-03-07T23:31:09.850ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330492025-03-07T23:31:09.850ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330502025-03-07T23:31:09.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330512025-03-07T23:31:09.853ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330522025-03-07T23:31:09.853ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330532025-03-07T23:31:09.854ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330542025-03-07T23:31:09.856ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330552025-03-07T23:31:09.856ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330562025-03-07T23:31:09.857ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330572025-03-07T23:31:09.859ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330582025-03-07T23:31:09.859ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330592025-03-07T23:31:09.859ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330602025-03-07T23:31:09.859ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330612025-03-07T23:31:09.859ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330622025-03-07T23:31:09.862ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330632025-03-07T23:31:09.862ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330642025-03-07T23:31:09.862ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330652025-03-07T23:31:09.863ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330662025-03-07T23:31:09.865ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330672025-03-07T23:31:09.865ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330682025-03-07T23:31:09.866ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330692025-03-07T23:31:09.866ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330702025-03-07T23:31:09.869ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330712025-03-07T23:31:09.877ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330722025-03-07T23:31:09.877ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330732025-03-07T23:31:09.877ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330742025-03-07T23:31:09.878ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330752025-03-07T23:31:09.880ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330762025-03-07T23:31:09.880ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330772025-03-07T23:31:09.880ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330782025-03-07T23:31:09.882ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330792025-03-07T23:31:09.882ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330802025-03-07T23:31:09.883ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330812025-03-07T23:31:09.886ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330822025-03-07T23:31:09.886ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330832025-03-07T23:31:09.886ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330842025-03-07T23:31:09.886ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330852025-03-07T23:31:09.886ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330862025-03-07T23:31:09.890ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330872025-03-07T23:31:09.890ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330882025-03-07T23:31:09.890ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330892025-03-07T23:31:09.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330902025-03-07T23:31:09.892ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330912025-03-07T23:31:09.892ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330922025-03-07T23:31:09.892ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330932025-03-07T23:31:09.893ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330942025-03-07T23:31:09.897ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330952025-03-07T23:31:09.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330962025-03-07T23:31:09.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330972025-03-07T23:31:09.906ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330982025-03-07T23:31:09.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
330992025-03-07T23:31:09.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331002025-03-07T23:31:09.909ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331012025-03-07T23:31:09.917ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331022025-03-07T23:31:09.917ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331032025-03-07T23:31:09.917ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331042025-03-07T23:31:09.918ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331052025-03-07T23:31:09.922ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331062025-03-07T23:31:09.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331072025-03-07T23:31:09.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331082025-03-07T23:31:09.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331092025-03-07T23:31:09.928ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331102025-03-07T23:31:09.938ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331112025-03-07T23:31:09.938ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331122025-03-07T23:31:09.938ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331132025-03-07T23:31:09.938ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331142025-03-07T23:31:09.955ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 132008 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4596b362-6e78-4350-b9a8-9f65dfcb78b2 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331152025-03-07T23:31:09.957ZINFOtest_unauthorized (external client test context): client received response status = 200
331162025-03-07T23:31:09.957ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331172025-03-07T23:31:09.957ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331182025-03-07T23:31:09.957ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331192025-03-07T23:31:09.957ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331202025-03-07T23:31:09.957ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331212025-03-07T23:31:09.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331222025-03-07T23:31:09.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331232025-03-07T23:31:09.958ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331242025-03-07T23:31:09.971ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331252025-03-07T23:31:09.971ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331262025-03-07T23:31:09.971ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331272025-03-07T23:31:09.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
331282025-03-07T23:31:09.979ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
331292025-03-07T23:31:09.979ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331302025-03-07T23:31:09.979ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331312025-03-07T23:31:09.980ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331322025-03-07T23:31:09.983ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
331332025-03-07T23:31:09.983ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331342025-03-07T23:31:09.983ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331352025-03-07T23:31:09.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331362025-03-07T23:31:09.992ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
331372025-03-07T23:31:10.001ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
331382025-03-07T23:31:10.001ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331392025-03-07T23:31:10.001ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331402025-03-07T23:31:10.009ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331412025-03-07T23:31:10.024ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
331422025-03-07T23:31:10.024ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
331432025-03-07T23:31:10.024ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331442025-03-07T23:31:10.024ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331452025-03-07T23:31:10.024ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331462025-03-07T23:31:10.028ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
331472025-03-07T23:31:10.028ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
331482025-03-07T23:31:10.028ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
331492025-03-07T23:31:10.028ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
331502025-03-07T23:31:10.030ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
331512025-03-07T23:31:10.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
331522025-03-07T23:31:10.036ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331532025-03-07T23:31:10.036ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331542025-03-07T23:31:10.036ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331552025-03-07T23:31:10.037ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331562025-03-07T23:31:10.040ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331572025-03-07T23:31:10.040ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331582025-03-07T23:31:10.053ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331592025-03-07T23:31:10.056ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331602025-03-07T23:31:10.056ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331612025-03-07T23:31:10.057ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331622025-03-07T23:31:10.058ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331632025-03-07T23:31:10.058ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331642025-03-07T23:31:10.058ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331652025-03-07T23:31:10.059ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331662025-03-07T23:31:10.059ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331672025-03-07T23:31:10.062ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331682025-03-07T23:31:10.062ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331692025-03-07T23:31:10.062ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331702025-03-07T23:31:10.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331712025-03-07T23:31:10.066ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331722025-03-07T23:31:10.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331732025-03-07T23:31:10.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331742025-03-07T23:31:10.067ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331752025-03-07T23:31:10.069ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331762025-03-07T23:31:10.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331772025-03-07T23:31:10.090ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 133289 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33e8d20d-e61a-47e0-92d2-040caef4c2e1 response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331782025-03-07T23:31:10.091ZINFOtest_unauthorized (external client test context): client received response status = 404
331792025-03-07T23:31:10.094ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331802025-03-07T23:31:10.094ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331812025-03-07T23:31:10.094ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c3a2cd0-cd2a-499d-abea-14fb5e037045 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331822025-03-07T23:31:10.095ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c3a2cd0-cd2a-499d-abea-14fb5e037045 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331832025-03-07T23:31:10.095ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c3a2cd0-cd2a-499d-abea-14fb5e037045 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331842025-03-07T23:31:10.095ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c3a2cd0-cd2a-499d-abea-14fb5e037045 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331852025-03-07T23:31:10.095ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 400 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6c3a2cd0-cd2a-499d-abea-14fb5e037045 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331862025-03-07T23:31:10.095ZINFOtest_unauthorized (external client test context): client received response status = 401
331872025-03-07T23:31:10.095ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331882025-03-07T23:31:10.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331892025-03-07T23:31:10.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 86799950-a8e8-48df-8b80-32387e0342ab uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331902025-03-07T23:31:10.096ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 86799950-a8e8-48df-8b80-32387e0342ab uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331912025-03-07T23:31:10.096ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 86799950-a8e8-48df-8b80-32387e0342ab uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331922025-03-07T23:31:10.096ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 203 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 86799950-a8e8-48df-8b80-32387e0342ab response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331932025-03-07T23:31:10.096ZINFOtest_unauthorized (external client test context): client received response status = 401
331942025-03-07T23:31:10.096ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331952025-03-07T23:31:10.096ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331962025-03-07T23:31:10.096ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b8c20e0-cdce-4dd0-aeae-dfe7909fdcda uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331972025-03-07T23:31:10.097ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b8c20e0-cdce-4dd0-aeae-dfe7909fdcda uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331982025-03-07T23:31:10.098ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3105:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3138:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b8c20e0-cdce-4dd0-aeae-dfe7909fdcda uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
331992025-03-07T23:31:10.099ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2376 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 1b8c20e0-cdce-4dd0-aeae-dfe7909fdcda response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332002025-03-07T23:31:10.099ZINFOtest_unauthorized (external client test context): client received response status = 401
332012025-03-07T23:31:10.099ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332022025-03-07T23:31:10.100ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332032025-03-07T23:31:10.100ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cecba0ad-889f-4652-98ec-e542526a92cc uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332042025-03-07T23:31:10.100ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 169 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cecba0ad-889f-4652-98ec-e542526a92cc response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332052025-03-07T23:31:10.101ZINFOtest_unauthorized (external client test context): client received response status = 405
332062025-03-07T23:31:10.101ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332072025-03-07T23:31:10.101ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332082025-03-07T23:31:10.101ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4489e7bb-1c5d-43ff-87b2-35a076d7dd2c uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332092025-03-07T23:31:10.101ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4489e7bb-1c5d-43ff-87b2-35a076d7dd2c response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332102025-03-07T23:31:10.101ZINFOtest_unauthorized (external client test context): client received response status = 405
332112025-03-07T23:31:10.101ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332122025-03-07T23:31:10.101ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332132025-03-07T23:31:10.102ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e2c8215d-6162-4b9b-a97c-0572e9d6b883 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332142025-03-07T23:31:10.102ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e2c8215d-6162-4b9b-a97c-0572e9d6b883 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332152025-03-07T23:31:10.102ZINFOtest_unauthorized (external client test context): client received response status = 405
332162025-03-07T23:31:10.102ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332172025-03-07T23:31:10.102ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332182025-03-07T23:31:10.102ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 723df235-644d-48fc-8470-f319f87ddb21 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332192025-03-07T23:31:10.102ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 723df235-644d-48fc-8470-f319f87ddb21 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332202025-03-07T23:31:10.102ZINFOtest_unauthorized (external client test context): client received response status = 405
332212025-03-07T23:31:10.102ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332222025-03-07T23:31:10.103ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332232025-03-07T23:31:10.103ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332242025-03-07T23:31:10.103ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332252025-03-07T23:31:10.103ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332262025-03-07T23:31:10.103ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332272025-03-07T23:31:10.103ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332282025-03-07T23:31:10.104ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332292025-03-07T23:31:10.118ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332302025-03-07T23:31:10.118ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332312025-03-07T23:31:10.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332322025-03-07T23:31:10.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
332332025-03-07T23:31:10.127ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
332342025-03-07T23:31:10.127ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332352025-03-07T23:31:10.127ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332362025-03-07T23:31:10.132ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332372025-03-07T23:31:10.137ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332382025-03-07T23:31:10.137ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332392025-03-07T23:31:10.137ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332402025-03-07T23:31:10.138ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332412025-03-07T23:31:10.140ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
332422025-03-07T23:31:10.145ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
332432025-03-07T23:31:10.145ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332442025-03-07T23:31:10.145ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332452025-03-07T23:31:10.146ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332462025-03-07T23:31:10.149ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
332472025-03-07T23:31:10.149ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
332482025-03-07T23:31:10.149ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332492025-03-07T23:31:10.149ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332502025-03-07T23:31:10.150ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332512025-03-07T23:31:10.152ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
332522025-03-07T23:31:10.152ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
332532025-03-07T23:31:10.153ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
332542025-03-07T23:31:10.154ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
332552025-03-07T23:31:10.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
332562025-03-07T23:31:10.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
332572025-03-07T23:31:10.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
332582025-03-07T23:31:10.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
332592025-03-07T23:31:10.158ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
332602025-03-07T23:31:10.164ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
332612025-03-07T23:31:10.164ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332622025-03-07T23:31:10.164ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332632025-03-07T23:31:10.164ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332642025-03-07T23:31:10.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332652025-03-07T23:31:10.172ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
332662025-03-07T23:31:10.173ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
332672025-03-07T23:31:10.173ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332682025-03-07T23:31:10.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332692025-03-07T23:31:10.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332702025-03-07T23:31:10.180ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
332712025-03-07T23:31:10.180ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
332722025-03-07T23:31:10.180ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332732025-03-07T23:31:10.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332742025-03-07T23:31:10.181ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332752025-03-07T23:31:10.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332762025-03-07T23:31:10.194ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332772025-03-07T23:31:10.194ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332782025-03-07T23:31:10.195ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332792025-03-07T23:31:10.196ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332802025-03-07T23:31:10.199ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332812025-03-07T23:31:10.199ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332822025-03-07T23:31:10.199ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332832025-03-07T23:31:10.200ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332842025-03-07T23:31:10.215ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332852025-03-07T23:31:10.215ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332862025-03-07T23:31:10.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332872025-03-07T23:31:10.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332882025-03-07T23:31:10.220ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332892025-03-07T23:31:10.246ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332902025-03-07T23:31:10.246ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 142876 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ec65b79b-7e58-432f-8230-199a273409fd response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332912025-03-07T23:31:10.246ZINFOtest_unauthorized (external client test context): client received response status = 404
332922025-03-07T23:31:10.247ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332932025-03-07T23:31:10.247ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332942025-03-07T23:31:10.247ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70205560-cc77-43d4-8c8a-4444fd9c8f6e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332952025-03-07T23:31:10.247ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70205560-cc77-43d4-8c8a-4444fd9c8f6e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332962025-03-07T23:31:10.247ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70205560-cc77-43d4-8c8a-4444fd9c8f6e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332972025-03-07T23:31:10.247ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70205560-cc77-43d4-8c8a-4444fd9c8f6e uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332982025-03-07T23:31:10.247ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 368 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 70205560-cc77-43d4-8c8a-4444fd9c8f6e response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
332992025-03-07T23:31:10.247ZINFOtest_unauthorized (external client test context): client received response status = 401
333002025-03-07T23:31:10.247ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333012025-03-07T23:31:10.248ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333022025-03-07T23:31:10.248ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f57c6b24-70b4-4a59-ba2d-4bf752ff0cb3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333032025-03-07T23:31:10.248ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f57c6b24-70b4-4a59-ba2d-4bf752ff0cb3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333042025-03-07T23:31:10.248ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f57c6b24-70b4-4a59-ba2d-4bf752ff0cb3 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333052025-03-07T23:31:10.248ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 204 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f57c6b24-70b4-4a59-ba2d-4bf752ff0cb3 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333062025-03-07T23:31:10.248ZINFOtest_unauthorized (external client test context): client received response status = 401
333072025-03-07T23:31:10.248ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333082025-03-07T23:31:10.248ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333092025-03-07T23:31:10.249ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3c3aa744-dd12-47a7-b2fb-5e792316fe09 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333102025-03-07T23:31:10.249ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3c3aa744-dd12-47a7-b2fb-5e792316fe09 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333112025-03-07T23:31:10.250ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3149:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3183:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_add::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::AntiAffinityGroupMember>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3c3aa744-dd12-47a7-b2fb-5e792316fe09 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333122025-03-07T23:31:10.250ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1179 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3c3aa744-dd12-47a7-b2fb-5e792316fe09 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333132025-03-07T23:31:10.250ZINFOtest_unauthorized (external client test context): client received response status = 401
333142025-03-07T23:31:10.250ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333152025-03-07T23:31:10.250ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333162025-03-07T23:31:10.250ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333172025-03-07T23:31:10.250ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333182025-03-07T23:31:10.250ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333192025-03-07T23:31:10.250ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333202025-03-07T23:31:10.250ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333212025-03-07T23:31:10.251ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333222025-03-07T23:31:10.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333232025-03-07T23:31:10.254ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333242025-03-07T23:31:10.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333252025-03-07T23:31:10.260ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
333262025-03-07T23:31:10.260ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
333272025-03-07T23:31:10.260ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
333282025-03-07T23:31:10.260ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333292025-03-07T23:31:10.260ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333302025-03-07T23:31:10.261ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333312025-03-07T23:31:10.270ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
333322025-03-07T23:31:10.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333332025-03-07T23:31:10.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333342025-03-07T23:31:10.271ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333352025-03-07T23:31:10.279ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
333362025-03-07T23:31:10.287ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
333372025-03-07T23:31:10.287ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333382025-03-07T23:31:10.287ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333392025-03-07T23:31:10.288ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333402025-03-07T23:31:10.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
333412025-03-07T23:31:10.293ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
333422025-03-07T23:31:10.295ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333432025-03-07T23:31:10.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333442025-03-07T23:31:10.298ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333452025-03-07T23:31:10.302ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
333462025-03-07T23:31:10.303ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
333472025-03-07T23:31:10.304ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
333482025-03-07T23:31:10.306ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
333492025-03-07T23:31:10.310ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
333502025-03-07T23:31:10.316ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
333512025-03-07T23:31:10.316ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333522025-03-07T23:31:10.319ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333532025-03-07T23:31:10.319ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333542025-03-07T23:31:10.322ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333552025-03-07T23:31:10.327ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333562025-03-07T23:31:10.329ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333572025-03-07T23:31:10.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333582025-03-07T23:31:10.335ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333592025-03-07T23:31:10.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333602025-03-07T23:31:10.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333612025-03-07T23:31:10.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333622025-03-07T23:31:10.342ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333632025-03-07T23:31:10.344ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333642025-03-07T23:31:10.344ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333652025-03-07T23:31:10.346ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333662025-03-07T23:31:10.352ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333672025-03-07T23:31:10.352ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333682025-03-07T23:31:10.352ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333692025-03-07T23:31:10.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333702025-03-07T23:31:10.422ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333712025-03-07T23:31:10.422ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333722025-03-07T23:31:10.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333732025-03-07T23:31:10.423ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333742025-03-07T23:31:10.453ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333752025-03-07T23:31:10.482ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Err(ObjectNotFound { type_name: AntiAffinityGroup, lookup_type: ByName("demo-anti-affinity-group") }) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333762025-03-07T23:31:10.482ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: anti-affinity-group with name "demo-anti-affinity-group" error_message_internal = not found: anti-affinity-group with name "demo-anti-affinity-group" latency_us = 232092 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10d8b321-e81b-4a7e-9777-7e0ce654d42d response_code = 404 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333772025-03-07T23:31:10.486ZINFOtest_unauthorized (external client test context): client received response status = 404
333782025-03-07T23:31:10.487ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333792025-03-07T23:31:10.487ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333802025-03-07T23:31:10.487ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
333812025-03-07T23:31:10.487ZDEBGtest_unauthorized (MgsClient): client response background_task = bfd_manager result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
333822025-03-07T23:31:10.487ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = bfd_manager reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
333832025-03-07T23:31:10.487ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
333842025-03-07T23:31:10.487ZDEBGtest_unauthorized (MgsClient): client response background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
333852025-03-07T23:31:10.488ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = switch_port_config_manager rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
333862025-03-07T23:31:10.488ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c400120-159f-43c9-9bce-f2f08210a465 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333872025-03-07T23:31:10.488ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c400120-159f-43c9-9bce-f2f08210a465 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333882025-03-07T23:31:10.488ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c400120-159f-43c9-9bce-f2f08210a465 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333892025-03-07T23:31:10.488ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c400120-159f-43c9-9bce-f2f08210a465 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333902025-03-07T23:31:10.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 519 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8c400120-159f-43c9-9bce-f2f08210a465 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333912025-03-07T23:31:10.488ZINFOtest_unauthorized (external client test context): client received response status = 401
333922025-03-07T23:31:10.489ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333932025-03-07T23:31:10.489ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333942025-03-07T23:31:10.489ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5729b9c9-699a-4738-965d-5e810c20f296 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333952025-03-07T23:31:10.489ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5729b9c9-699a-4738-965d-5e810c20f296 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333962025-03-07T23:31:10.489ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5729b9c9-699a-4738-965d-5e810c20f296 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333972025-03-07T23:31:10.489ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 219 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5729b9c9-699a-4738-965d-5e810c20f296 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
333982025-03-07T23:31:10.489ZINFOtest_unauthorized (external client test context): client received response status = 401
333992025-03-07T23:31:10.489ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334002025-03-07T23:31:10.490ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334012025-03-07T23:31:10.490ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 64e52c9b-f15c-4aa8-9fcb-e5138abcc101 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334022025-03-07T23:31:10.490ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 64e52c9b-f15c-4aa8-9fcb-e5138abcc101 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334032025-03-07T23:31:10.492ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:3194:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:3228:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::anti_affinity_group_member_affinity_group_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::AntiAffinityAffinityGroupMemberPath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 64e52c9b-f15c-4aa8-9fcb-e5138abcc101 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334042025-03-07T23:31:10.492ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1452 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 64e52c9b-f15c-4aa8-9fcb-e5138abcc101 response_code = 401 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334052025-03-07T23:31:10.492ZINFOtest_unauthorized (external client test context): client received response status = 401
334062025-03-07T23:31:10.492ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334072025-03-07T23:31:10.492ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334082025-03-07T23:31:10.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 47a292e3-d227-4670-b1fc-5571053b2234 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334092025-03-07T23:31:10.492ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 47a292e3-d227-4670-b1fc-5571053b2234 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334102025-03-07T23:31:10.492ZINFOtest_unauthorized (external client test context): client received response status = 405
334112025-03-07T23:31:10.492ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334122025-03-07T23:31:10.492ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334132025-03-07T23:31:10.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bf0f3e5f-ec4d-4d65-a72e-1d7f5f8d6e6b uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334142025-03-07T23:31:10.492ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bf0f3e5f-ec4d-4d65-a72e-1d7f5f8d6e6b response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334152025-03-07T23:31:10.492ZINFOtest_unauthorized (external client test context): client received response status = 405
334162025-03-07T23:31:10.492ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334172025-03-07T23:31:10.493ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334182025-03-07T23:31:10.493ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d5979ed3-efd4-4c4d-a3f7-503d0ca4d309 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334192025-03-07T23:31:10.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d5979ed3-efd4-4c4d-a3f7-503d0ca4d309 response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334202025-03-07T23:31:10.493ZINFOtest_unauthorized (external client test context): client received response status = 405
334212025-03-07T23:31:10.493ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334222025-03-07T23:31:10.493ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334232025-03-07T23:31:10.493ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 88ec5b6a-a9c9-40f7-bf59-9839a11be3bb uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334242025-03-07T23:31:10.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 88ec5b6a-a9c9-40f7-bf59-9839a11be3bb response_code = 405 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334252025-03-07T23:31:10.494ZINFOtest_unauthorized (external client test context): client received response status = 405
334262025-03-07T23:31:10.494ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334272025-03-07T23:31:10.494ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334282025-03-07T23:31:10.494ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334292025-03-07T23:31:10.494ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334302025-03-07T23:31:10.494ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334312025-03-07T23:31:10.494ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334322025-03-07T23:31:10.494ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334332025-03-07T23:31:10.495ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334342025-03-07T23:31:10.499ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334352025-03-07T23:31:10.499ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334362025-03-07T23:31:10.500ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334372025-03-07T23:31:10.512ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
334382025-03-07T23:31:10.512ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
334392025-03-07T23:31:10.512ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334402025-03-07T23:31:10.512ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334412025-03-07T23:31:10.513ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334422025-03-07T23:31:10.517ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
334432025-03-07T23:31:10.517ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334442025-03-07T23:31:10.517ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334452025-03-07T23:31:10.517ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334462025-03-07T23:31:10.524ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
334472025-03-07T23:31:10.536ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
334482025-03-07T23:31:10.536ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334492025-03-07T23:31:10.536ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334502025-03-07T23:31:10.537ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334512025-03-07T23:31:10.547ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
334522025-03-07T23:31:10.547ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
334532025-03-07T23:31:10.547ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334542025-03-07T23:31:10.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334552025-03-07T23:31:10.547ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334562025-03-07T23:31:10.560ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
334572025-03-07T23:31:10.560ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
334582025-03-07T23:31:10.560ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
334592025-03-07T23:31:10.568ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
334602025-03-07T23:31:10.571ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
334612025-03-07T23:31:10.571ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
334622025-03-07T23:31:10.576ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
334632025-03-07T23:31:10.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
334642025-03-07T23:31:10.581ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334652025-03-07T23:31:10.581ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334662025-03-07T23:31:10.581ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334672025-03-07T23:31:10.581ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334682025-03-07T23:31:10.582ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
334692025-03-07T23:31:10.584ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
334702025-03-07T23:31:10.584ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
334712025-03-07T23:31:10.584ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
334722025-03-07T23:31:10.587ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334732025-03-07T23:31:10.587ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334742025-03-07T23:31:10.588ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334752025-03-07T23:31:10.590ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334762025-03-07T23:31:10.590ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334772025-03-07T23:31:10.591ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334782025-03-07T23:31:10.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334792025-03-07T23:31:10.594ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334802025-03-07T23:31:10.594ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334812025-03-07T23:31:10.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334822025-03-07T23:31:10.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334832025-03-07T23:31:10.600ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334842025-03-07T23:31:10.600ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334852025-03-07T23:31:10.600ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334862025-03-07T23:31:10.602ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334872025-03-07T23:31:10.607ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334882025-03-07T23:31:10.607ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334892025-03-07T23:31:10.607ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334902025-03-07T23:31:10.607ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334912025-03-07T23:31:10.610ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334922025-03-07T23:31:10.621ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334932025-03-07T23:31:10.621ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334942025-03-07T23:31:10.621ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334952025-03-07T23:31:10.622ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334962025-03-07T23:31:10.625ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334972025-03-07T23:31:10.625ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334982025-03-07T23:31:10.626ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
334992025-03-07T23:31:10.628ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335002025-03-07T23:31:10.628ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335012025-03-07T23:31:10.628ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335022025-03-07T23:31:10.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335032025-03-07T23:31:10.630ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335042025-03-07T23:31:10.630ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335052025-03-07T23:31:10.630ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335062025-03-07T23:31:10.631ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335072025-03-07T23:31:10.635ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335082025-03-07T23:31:10.635ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335092025-03-07T23:31:10.635ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335102025-03-07T23:31:10.635ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335112025-03-07T23:31:10.639ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335122025-03-07T23:31:10.639ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335132025-03-07T23:31:10.639ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335142025-03-07T23:31:10.640ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335152025-03-07T23:31:10.642ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335162025-03-07T23:31:10.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = AffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 47ec7215-57da-488b-9134-9276b72180bc, lookup_type: ByName("demo-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335172025-03-07T23:31:10.653ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335182025-03-07T23:31:10.653ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335192025-03-07T23:31:10.653ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335202025-03-07T23:31:10.653ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335212025-03-07T23:31:10.653ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335222025-03-07T23:31:10.661ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335232025-03-07T23:31:10.661ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335242025-03-07T23:31:10.661ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335252025-03-07T23:31:10.661ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335262025-03-07T23:31:10.665ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335272025-03-07T23:31:10.665ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335282025-03-07T23:31:10.665ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335292025-03-07T23:31:10.666ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335302025-03-07T23:31:10.668ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335312025-03-07T23:31:10.677ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = AntiAffinityGroup { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 7f41c12e-9710-43a4-9f24-14f22db1cb36, lookup_type: ByName("demo-anti-affinity-group") } result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335322025-03-07T23:31:10.677ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335332025-03-07T23:31:10.677ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 roles = RoleSet { roles: {} } uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335342025-03-07T23:31:10.678ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 resource = Database result = Ok(()) uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335352025-03-07T23:31:10.683ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 189200 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cdeb6dcb-d1f0-4cd3-be08-f001598bdf43 response_code = 200 uri = /v1/anti-affinity-groups/demo-anti-affinity-group/members/affinity-group/demo-affinity-group?project=demo-project
335362025-03-07T23:31:10.683ZINFOtest_unauthorized (external client test context): client received response status = 200
335372025-03-07T23:31:10.684ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335382025-03-07T23:31:10.684ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335392025-03-07T23:31:10.684ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335402025-03-07T23:31:10.684ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335412025-03-07T23:31:10.684ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = beb2765e-508f-4d2c-b46e-0eb4601db9e0 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335422025-03-07T23:31:10.684ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = beb2765e-508f-4d2c-b46e-0eb4601db9e0 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335432025-03-07T23:31:10.684ZINFOtest_unauthorized (external client test context): client received response status = 405
335442025-03-07T23:31:10.684ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335452025-03-07T23:31:10.684ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335462025-03-07T23:31:10.685ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 169809bd-3d7c-49a2-8119-1fadc554ac73 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335472025-03-07T23:31:10.685ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 110 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 169809bd-3d7c-49a2-8119-1fadc554ac73 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335482025-03-07T23:31:10.685ZINFOtest_unauthorized (external client test context): client received response status = 405
335492025-03-07T23:31:10.685ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335502025-03-07T23:31:10.685ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335512025-03-07T23:31:10.685ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf1ac5ae-cfd2-4a9d-afdc-5f8b0de594c6 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335522025-03-07T23:31:10.686ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 227 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf1ac5ae-cfd2-4a9d-afdc-5f8b0de594c6 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335532025-03-07T23:31:10.687ZINFOtest_unauthorized (external client test context): client received response status = 405
335542025-03-07T23:31:10.687ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335552025-03-07T23:31:10.687ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335562025-03-07T23:31:10.687ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 561cc8fd-3712-4449-8cc6-26496ae834fa uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335572025-03-07T23:31:10.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 190 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 561cc8fd-3712-4449-8cc6-26496ae834fa response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335582025-03-07T23:31:10.688ZINFOtest_unauthorized (external client test context): client received response status = 405
335592025-03-07T23:31:10.688ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335602025-03-07T23:31:10.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335612025-03-07T23:31:10.688ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3c48a1f8-2f01-4620-9626-28527e0273b4 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335622025-03-07T23:31:10.688ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3c48a1f8-2f01-4620-9626-28527e0273b4 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335632025-03-07T23:31:10.689ZINFOtest_unauthorized (external client test context): client received response status = 405
335642025-03-07T23:31:10.689ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335652025-03-07T23:31:10.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335662025-03-07T23:31:10.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 18e4dfe0-6308-4c37-b752-0b6b2d4dbb34 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335672025-03-07T23:31:10.689ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 18e4dfe0-6308-4c37-b752-0b6b2d4dbb34 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335682025-03-07T23:31:10.689ZINFOtest_unauthorized (external client test context): client received response status = 405
335692025-03-07T23:31:10.689ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335702025-03-07T23:31:10.689ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335712025-03-07T23:31:10.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 71b14da2-580b-4f30-bafe-5327915eac6c uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335722025-03-07T23:31:10.689ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 71b14da2-580b-4f30-bafe-5327915eac6c response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335732025-03-07T23:31:10.690ZINFOtest_unauthorized (external client test context): client received response status = 405
335742025-03-07T23:31:10.690ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335752025-03-07T23:31:10.690ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335762025-03-07T23:31:10.690ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efbce453-c004-4726-b4b0-7635d0bd4cc8 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335772025-03-07T23:31:10.690ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = efbce453-c004-4726-b4b0-7635d0bd4cc8 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335782025-03-07T23:31:10.690ZINFOtest_unauthorized (external client test context): client received response status = 405
335792025-03-07T23:31:10.690ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335802025-03-07T23:31:10.690ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335812025-03-07T23:31:10.691ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335822025-03-07T23:31:10.691ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335832025-03-07T23:31:10.691ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
335842025-03-07T23:31:10.691ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335852025-03-07T23:31:10.691ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335862025-03-07T23:31:10.692ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335872025-03-07T23:31:10.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335882025-03-07T23:31:10.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335892025-03-07T23:31:10.728ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335902025-03-07T23:31:10.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
335912025-03-07T23:31:10.737ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
335922025-03-07T23:31:10.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335932025-03-07T23:31:10.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335942025-03-07T23:31:10.742ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335952025-03-07T23:31:10.752ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
335962025-03-07T23:31:10.752ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
335972025-03-07T23:31:10.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
335982025-03-07T23:31:10.754ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
335992025-03-07T23:31:10.770ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
336002025-03-07T23:31:10.777ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
336012025-03-07T23:31:10.777ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336022025-03-07T23:31:10.777ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336032025-03-07T23:31:10.779ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336042025-03-07T23:31:10.789ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
336052025-03-07T23:31:10.789ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
336062025-03-07T23:31:10.789ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336072025-03-07T23:31:10.789ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336082025-03-07T23:31:10.790ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336092025-03-07T23:31:10.793ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
336102025-03-07T23:31:10.794ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
336112025-03-07T23:31:10.794ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
336122025-03-07T23:31:10.794ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
336132025-03-07T23:31:10.801ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
336142025-03-07T23:31:10.805ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
336152025-03-07T23:31:10.805ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336162025-03-07T23:31:10.805ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336172025-03-07T23:31:10.805ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336182025-03-07T23:31:10.806ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336192025-03-07T23:31:10.813ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336202025-03-07T23:31:10.813ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336212025-03-07T23:31:10.814ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336222025-03-07T23:31:10.818ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336232025-03-07T23:31:10.819ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336242025-03-07T23:31:10.819ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336252025-03-07T23:31:10.823ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336262025-03-07T23:31:10.823ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336272025-03-07T23:31:10.823ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336282025-03-07T23:31:10.823ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336292025-03-07T23:31:10.823ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336302025-03-07T23:31:10.827ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336312025-03-07T23:31:10.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336322025-03-07T23:31:10.827ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336332025-03-07T23:31:10.828ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336342025-03-07T23:31:10.838ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336352025-03-07T23:31:10.838ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336362025-03-07T23:31:10.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336372025-03-07T23:31:10.839ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336382025-03-07T23:31:10.842ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336392025-03-07T23:31:10.867ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336402025-03-07T23:31:10.867ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 176772 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d7c41d8-1922-4452-b5f8-c1f359784e79 response_code = 404 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336412025-03-07T23:31:10.868ZINFOtest_unauthorized (external client test context): client received response status = 404
336422025-03-07T23:31:10.869ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336432025-03-07T23:31:10.869ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336442025-03-07T23:31:10.872ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 98d24d0d-f47e-40e7-8fcb-9273fd2a35f9 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336452025-03-07T23:31:10.872ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 98d24d0d-f47e-40e7-8fcb-9273fd2a35f9 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336462025-03-07T23:31:10.872ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 98d24d0d-f47e-40e7-8fcb-9273fd2a35f9 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336472025-03-07T23:31:10.872ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 98d24d0d-f47e-40e7-8fcb-9273fd2a35f9 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336482025-03-07T23:31:10.872ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1208 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 98d24d0d-f47e-40e7-8fcb-9273fd2a35f9 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336492025-03-07T23:31:10.872ZINFOtest_unauthorized (external client test context): client received response status = 401
336502025-03-07T23:31:10.873ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336512025-03-07T23:31:10.873ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336522025-03-07T23:31:10.873ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 786067c0-e43f-4535-9302-53ec7585e2c6 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336532025-03-07T23:31:10.873ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 786067c0-e43f-4535-9302-53ec7585e2c6 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336542025-03-07T23:31:10.873ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 786067c0-e43f-4535-9302-53ec7585e2c6 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336552025-03-07T23:31:10.873ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 235 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 786067c0-e43f-4535-9302-53ec7585e2c6 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336562025-03-07T23:31:10.873ZINFOtest_unauthorized (external client test context): client received response status = 401
336572025-03-07T23:31:10.873ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336582025-03-07T23:31:10.873ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336592025-03-07T23:31:10.873ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fbf2f6da-6a8c-4cbe-8233-25a4fcdfb35c uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336602025-03-07T23:31:10.873ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fbf2f6da-6a8c-4cbe-8233-25a4fcdfb35c uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336612025-03-07T23:31:10.874ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1916:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1935:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_start::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fbf2f6da-6a8c-4cbe-8233-25a4fcdfb35c uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336622025-03-07T23:31:10.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1087 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = fbf2f6da-6a8c-4cbe-8233-25a4fcdfb35c response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336632025-03-07T23:31:10.875ZINFOtest_unauthorized (external client test context): client received response status = 401
336642025-03-07T23:31:10.875ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336652025-03-07T23:31:10.875ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336662025-03-07T23:31:10.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2583304a-7daf-4c76-9b9f-a7c94a882bef uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336672025-03-07T23:31:10.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2583304a-7daf-4c76-9b9f-a7c94a882bef response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336682025-03-07T23:31:10.875ZINFOtest_unauthorized (external client test context): client received response status = 405
336692025-03-07T23:31:10.875ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336702025-03-07T23:31:10.875ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336712025-03-07T23:31:10.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2b7c37ed-6ac6-46f9-8334-d89e7f8d9a86 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336722025-03-07T23:31:10.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2b7c37ed-6ac6-46f9-8334-d89e7f8d9a86 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336732025-03-07T23:31:10.875ZINFOtest_unauthorized (external client test context): client received response status = 405
336742025-03-07T23:31:10.875ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336752025-03-07T23:31:10.876ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336762025-03-07T23:31:10.876ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 286b28c4-013e-4282-98da-1e68eb91f7b4 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336772025-03-07T23:31:10.876ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 286b28c4-013e-4282-98da-1e68eb91f7b4 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336782025-03-07T23:31:10.876ZINFOtest_unauthorized (external client test context): client received response status = 405
336792025-03-07T23:31:10.876ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336802025-03-07T23:31:10.876ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336812025-03-07T23:31:10.876ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58756203-a294-40b0-ab87-71b14206041f uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336822025-03-07T23:31:10.876ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58756203-a294-40b0-ab87-71b14206041f response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336832025-03-07T23:31:10.877ZINFOtest_unauthorized (external client test context): client received response status = 405
336842025-03-07T23:31:10.877ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336852025-03-07T23:31:10.877ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336862025-03-07T23:31:10.877ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 546b3fbb-fc25-4a36-aa1b-dc06cf137c5d uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336872025-03-07T23:31:10.877ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 138 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 546b3fbb-fc25-4a36-aa1b-dc06cf137c5d response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336882025-03-07T23:31:10.877ZINFOtest_unauthorized (external client test context): client received response status = 405
336892025-03-07T23:31:10.877ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336902025-03-07T23:31:10.878ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336912025-03-07T23:31:10.878ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4c4e4776-5428-4f75-8439-30013a7b099f uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336922025-03-07T23:31:10.878ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4c4e4776-5428-4f75-8439-30013a7b099f response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336932025-03-07T23:31:10.878ZINFOtest_unauthorized (external client test context): client received response status = 405
336942025-03-07T23:31:10.878ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336952025-03-07T23:31:10.878ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336962025-03-07T23:31:10.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8d1e3d7e-5828-4f41-8290-fd503158c850 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336972025-03-07T23:31:10.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 87 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8d1e3d7e-5828-4f41-8290-fd503158c850 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
336982025-03-07T23:31:10.879ZINFOtest_unauthorized (external client test context): client received response status = 405
336992025-03-07T23:31:10.879ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
337002025-03-07T23:31:10.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-start?project=demo-project
337012025-03-07T23:31:10.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 673f96c7-0b66-44ef-8331-89820edec314 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
337022025-03-07T23:31:10.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 98 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 673f96c7-0b66-44ef-8331-89820edec314 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
337032025-03-07T23:31:10.879ZINFOtest_unauthorized (external client test context): client received response status = 405
337042025-03-07T23:31:10.880ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/bulk-write-start?project=demo-project
337052025-03-07T23:31:10.880ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337062025-03-07T23:31:10.880ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337072025-03-07T23:31:10.880ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337082025-03-07T23:31:10.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337092025-03-07T23:31:10.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7b8decd5-ba7c-4f0f-a3d5-818801c3100a uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337102025-03-07T23:31:10.880ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7b8decd5-ba7c-4f0f-a3d5-818801c3100a response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337112025-03-07T23:31:10.880ZINFOtest_unauthorized (external client test context): client received response status = 405
337122025-03-07T23:31:10.880ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337132025-03-07T23:31:10.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337142025-03-07T23:31:10.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6bf6a64a-0ab7-437a-9251-2767e164c874 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337152025-03-07T23:31:10.880ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6bf6a64a-0ab7-437a-9251-2767e164c874 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337162025-03-07T23:31:10.881ZINFOtest_unauthorized (external client test context): client received response status = 405
337172025-03-07T23:31:10.881ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337182025-03-07T23:31:10.881ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337192025-03-07T23:31:10.881ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee5ed707-b81f-49c7-8cf8-7c1b06d91c2f uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337202025-03-07T23:31:10.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 202 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ee5ed707-b81f-49c7-8cf8-7c1b06d91c2f response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337212025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client received response status = 405
337222025-03-07T23:31:10.883ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337232025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337242025-03-07T23:31:10.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 06a79dac-7ded-4c3b-b577-db275c33de95 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337252025-03-07T23:31:10.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 06a79dac-7ded-4c3b-b577-db275c33de95 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337262025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client received response status = 405
337272025-03-07T23:31:10.883ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337282025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337292025-03-07T23:31:10.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50fe40ef-9f81-4ffc-9f15-44eee4d698f2 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337302025-03-07T23:31:10.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 50fe40ef-9f81-4ffc-9f15-44eee4d698f2 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337312025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client received response status = 405
337322025-03-07T23:31:10.883ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337332025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337342025-03-07T23:31:10.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3004bcc6-af6d-4fb7-940c-e8fb778dd920 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337352025-03-07T23:31:10.883ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3004bcc6-af6d-4fb7-940c-e8fb778dd920 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337362025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client received response status = 405
337372025-03-07T23:31:10.883ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337382025-03-07T23:31:10.883ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337392025-03-07T23:31:10.883ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fbafd06b-7020-42d1-8dfb-5bb77cf10003 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337402025-03-07T23:31:10.884ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = fbafd06b-7020-42d1-8dfb-5bb77cf10003 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337412025-03-07T23:31:10.884ZINFOtest_unauthorized (external client test context): client received response status = 405
337422025-03-07T23:31:10.884ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337432025-03-07T23:31:10.884ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337442025-03-07T23:31:10.884ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2bd060fb-ae47-47ae-b809-79a624bdecd3 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337452025-03-07T23:31:10.884ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 2bd060fb-ae47-47ae-b809-79a624bdecd3 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337462025-03-07T23:31:10.884ZINFOtest_unauthorized (external client test context): client received response status = 405
337472025-03-07T23:31:10.884ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337482025-03-07T23:31:10.885ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
337492025-03-07T23:31:10.885ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337502025-03-07T23:31:10.885ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337512025-03-07T23:31:10.885ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337522025-03-07T23:31:10.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337532025-03-07T23:31:10.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337542025-03-07T23:31:10.886ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337552025-03-07T23:31:10.888ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337562025-03-07T23:31:10.888ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337572025-03-07T23:31:10.889ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337582025-03-07T23:31:10.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
337592025-03-07T23:31:10.891ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
337602025-03-07T23:31:10.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337612025-03-07T23:31:10.891ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337622025-03-07T23:31:10.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337632025-03-07T23:31:10.894ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
337642025-03-07T23:31:10.894ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337652025-03-07T23:31:10.894ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337662025-03-07T23:31:10.895ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337672025-03-07T23:31:10.898ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
337682025-03-07T23:31:10.904ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
337692025-03-07T23:31:10.905ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337702025-03-07T23:31:10.905ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337712025-03-07T23:31:10.905ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337722025-03-07T23:31:10.909ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
337732025-03-07T23:31:10.909ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
337742025-03-07T23:31:10.909ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337752025-03-07T23:31:10.909ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337762025-03-07T23:31:10.911ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337772025-03-07T23:31:10.946ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
337782025-03-07T23:31:10.946ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
337792025-03-07T23:31:10.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
337802025-03-07T23:31:10.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
337812025-03-07T23:31:10.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
337822025-03-07T23:31:10.964ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
337832025-03-07T23:31:10.968ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337842025-03-07T23:31:10.968ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337852025-03-07T23:31:10.968ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337862025-03-07T23:31:10.969ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337872025-03-07T23:31:10.972ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337882025-03-07T23:31:10.972ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337892025-03-07T23:31:10.973ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337902025-03-07T23:31:10.975ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337912025-03-07T23:31:10.975ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337922025-03-07T23:31:10.976ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337932025-03-07T23:31:10.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337942025-03-07T23:31:10.980ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337952025-03-07T23:31:10.980ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337962025-03-07T23:31:10.980ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337972025-03-07T23:31:10.982ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337982025-03-07T23:31:10.988ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
337992025-03-07T23:31:10.988ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338002025-03-07T23:31:10.988ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338012025-03-07T23:31:10.991ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338022025-03-07T23:31:10.996ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338032025-03-07T23:31:10.997ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338042025-03-07T23:31:10.997ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338052025-03-07T23:31:10.997ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338062025-03-07T23:31:11.003ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338072025-03-07T23:31:11.029ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338082025-03-07T23:31:11.029ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 144170 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 54ba9731-5bf4-43ae-8add-5064f126bb99 response_code = 404 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338092025-03-07T23:31:11.030ZINFOtest_unauthorized (external client test context): client received response status = 404
338102025-03-07T23:31:11.030ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338112025-03-07T23:31:11.030ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338122025-03-07T23:31:11.031ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ba75d382-37b0-42e3-a040-b49eefbabc26 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338132025-03-07T23:31:11.031ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ba75d382-37b0-42e3-a040-b49eefbabc26 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338142025-03-07T23:31:11.031ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ba75d382-37b0-42e3-a040-b49eefbabc26 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338152025-03-07T23:31:11.031ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ba75d382-37b0-42e3-a040-b49eefbabc26 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338162025-03-07T23:31:11.031ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 709 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = ba75d382-37b0-42e3-a040-b49eefbabc26 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338172025-03-07T23:31:11.032ZINFOtest_unauthorized (external client test context): client received response status = 401
338182025-03-07T23:31:11.032ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338192025-03-07T23:31:11.032ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338202025-03-07T23:31:11.032ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e543ebd6-5c61-486b-b5ff-0fbae7051c95 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338212025-03-07T23:31:11.033ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e543ebd6-5c61-486b-b5ff-0fbae7051c95 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338222025-03-07T23:31:11.033ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e543ebd6-5c61-486b-b5ff-0fbae7051c95 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338232025-03-07T23:31:11.033ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 310 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e543ebd6-5c61-486b-b5ff-0fbae7051c95 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338242025-03-07T23:31:11.033ZINFOtest_unauthorized (external client test context): client received response status = 401
338252025-03-07T23:31:11.033ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338262025-03-07T23:31:11.033ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338272025-03-07T23:31:11.034ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67e3f82a-8a8a-4b34-b655-8f28cc6fbe71 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338282025-03-07T23:31:11.035ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67e3f82a-8a8a-4b34-b655-8f28cc6fbe71 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338292025-03-07T23:31:11.036ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1947:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1967:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImportBlocksBulkWrite>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67e3f82a-8a8a-4b34-b655-8f28cc6fbe71 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338302025-03-07T23:31:11.036ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2044 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 67e3f82a-8a8a-4b34-b655-8f28cc6fbe71 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338312025-03-07T23:31:11.036ZINFOtest_unauthorized (external client test context): client received response status = 401
338322025-03-07T23:31:11.036ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338332025-03-07T23:31:11.036ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338342025-03-07T23:31:11.036ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fb0fcf91-cd44-4b79-bdb2-e7c06c659528 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338352025-03-07T23:31:11.036ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fb0fcf91-cd44-4b79-bdb2-e7c06c659528 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338362025-03-07T23:31:11.036ZINFOtest_unauthorized (external client test context): client received response status = 405
338372025-03-07T23:31:11.036ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338382025-03-07T23:31:11.037ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338392025-03-07T23:31:11.039ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cf7034aa-4b9f-465d-a110-00ce31fd5efb uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338402025-03-07T23:31:11.039ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cf7034aa-4b9f-465d-a110-00ce31fd5efb response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338412025-03-07T23:31:11.040ZINFOtest_unauthorized (external client test context): client received response status = 405
338422025-03-07T23:31:11.040ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338432025-03-07T23:31:11.040ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338442025-03-07T23:31:11.040ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 90226cfc-9b9f-41b1-a249-93cc041a5480 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338452025-03-07T23:31:11.041ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 304 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 90226cfc-9b9f-41b1-a249-93cc041a5480 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338462025-03-07T23:31:11.041ZINFOtest_unauthorized (external client test context): client received response status = 405
338472025-03-07T23:31:11.041ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338482025-03-07T23:31:11.041ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338492025-03-07T23:31:11.042ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d816c8da-494c-4695-a55e-5b8a29035abe uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338502025-03-07T23:31:11.042ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 106 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d816c8da-494c-4695-a55e-5b8a29035abe response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338512025-03-07T23:31:11.042ZINFOtest_unauthorized (external client test context): client received response status = 405
338522025-03-07T23:31:11.042ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338532025-03-07T23:31:11.042ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338542025-03-07T23:31:11.042ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 72387cd0-0979-4109-9541-2601addc6b9e uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338552025-03-07T23:31:11.042ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 72387cd0-0979-4109-9541-2601addc6b9e response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338562025-03-07T23:31:11.043ZINFOtest_unauthorized (external client test context): client received response status = 405
338572025-03-07T23:31:11.043ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338582025-03-07T23:31:11.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338592025-03-07T23:31:11.043ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9713998b-dfe2-43db-aeea-73602492c2c0 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338602025-03-07T23:31:11.043ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9713998b-dfe2-43db-aeea-73602492c2c0 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338612025-03-07T23:31:11.043ZINFOtest_unauthorized (external client test context): client received response status = 405
338622025-03-07T23:31:11.043ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338632025-03-07T23:31:11.043ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338642025-03-07T23:31:11.044ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 67b30ce0-af25-4bd5-92c8-c2c7d0f1ba74 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338652025-03-07T23:31:11.044ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 67b30ce0-af25-4bd5-92c8-c2c7d0f1ba74 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338662025-03-07T23:31:11.044ZINFOtest_unauthorized (external client test context): client received response status = 405
338672025-03-07T23:31:11.044ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338682025-03-07T23:31:11.044ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write?project=demo-project
338692025-03-07T23:31:11.044ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ae15dc1e-52c1-4165-85e3-e541039a8ae2 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338702025-03-07T23:31:11.044ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 212 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ae15dc1e-52c1-4165-85e3-e541039a8ae2 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338712025-03-07T23:31:11.045ZINFOtest_unauthorized (external client test context): client received response status = 405
338722025-03-07T23:31:11.046ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/bulk-write?project=demo-project
338732025-03-07T23:31:11.046ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338742025-03-07T23:31:11.046ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338752025-03-07T23:31:11.046ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338762025-03-07T23:31:11.046ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338772025-03-07T23:31:11.046ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 641d78e1-d91c-4090-adee-52b1499c075e uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338782025-03-07T23:31:11.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 641d78e1-d91c-4090-adee-52b1499c075e response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338792025-03-07T23:31:11.046ZINFOtest_unauthorized (external client test context): client received response status = 405
338802025-03-07T23:31:11.046ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338812025-03-07T23:31:11.046ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338822025-03-07T23:31:11.046ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c95a5e72-928f-4888-9c3e-41a57501f07f uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338832025-03-07T23:31:11.046ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c95a5e72-928f-4888-9c3e-41a57501f07f response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338842025-03-07T23:31:11.047ZINFOtest_unauthorized (external client test context): client received response status = 405
338852025-03-07T23:31:11.048ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338862025-03-07T23:31:11.049ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338872025-03-07T23:31:11.049ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77127a92-577a-4dae-9fed-71fa84c980cc uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338882025-03-07T23:31:11.049ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 109 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 77127a92-577a-4dae-9fed-71fa84c980cc response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338892025-03-07T23:31:11.049ZINFOtest_unauthorized (external client test context): client received response status = 405
338902025-03-07T23:31:11.050ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338912025-03-07T23:31:11.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338922025-03-07T23:31:11.050ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 505453f0-2aaa-4fe2-b8da-6326fb6f4907 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338932025-03-07T23:31:11.050ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 505453f0-2aaa-4fe2-b8da-6326fb6f4907 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338942025-03-07T23:31:11.050ZINFOtest_unauthorized (external client test context): client received response status = 405
338952025-03-07T23:31:11.050ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338962025-03-07T23:31:11.050ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338972025-03-07T23:31:11.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 385bd8c6-dea5-4c54-94eb-c29bbaa32306 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338982025-03-07T23:31:11.051ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 385bd8c6-dea5-4c54-94eb-c29bbaa32306 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
338992025-03-07T23:31:11.051ZINFOtest_unauthorized (external client test context): client received response status = 405
339002025-03-07T23:31:11.051ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339012025-03-07T23:31:11.051ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339022025-03-07T23:31:11.051ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dfe029c3-866a-4caf-b753-8a23adedbab8 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339032025-03-07T23:31:11.052ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = dfe029c3-866a-4caf-b753-8a23adedbab8 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339042025-03-07T23:31:11.052ZINFOtest_unauthorized (external client test context): client received response status = 405
339052025-03-07T23:31:11.052ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339062025-03-07T23:31:11.052ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339072025-03-07T23:31:11.052ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b2d7a861-7398-424f-a5bc-000aadb8bd0c uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339082025-03-07T23:31:11.053ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = b2d7a861-7398-424f-a5bc-000aadb8bd0c response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339092025-03-07T23:31:11.053ZINFOtest_unauthorized (external client test context): client received response status = 405
339102025-03-07T23:31:11.053ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339112025-03-07T23:31:11.053ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339122025-03-07T23:31:11.053ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8f2f9baf-b4e2-4f6e-8942-c69f723bbe05 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339132025-03-07T23:31:11.053ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 8f2f9baf-b4e2-4f6e-8942-c69f723bbe05 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339142025-03-07T23:31:11.054ZINFOtest_unauthorized (external client test context): client received response status = 405
339152025-03-07T23:31:11.054ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339162025-03-07T23:31:11.054ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339172025-03-07T23:31:11.054ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339182025-03-07T23:31:11.055ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339192025-03-07T23:31:11.055ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339202025-03-07T23:31:11.055ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339212025-03-07T23:31:11.055ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339222025-03-07T23:31:11.056ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339232025-03-07T23:31:11.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339242025-03-07T23:31:11.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339252025-03-07T23:31:11.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339262025-03-07T23:31:11.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
339272025-03-07T23:31:11.063ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
339282025-03-07T23:31:11.063ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339292025-03-07T23:31:11.063ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339302025-03-07T23:31:11.064ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339312025-03-07T23:31:11.066ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
339322025-03-07T23:31:11.066ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339332025-03-07T23:31:11.066ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339342025-03-07T23:31:11.067ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339352025-03-07T23:31:11.069ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
339362025-03-07T23:31:11.073ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
339372025-03-07T23:31:11.073ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339382025-03-07T23:31:11.073ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339392025-03-07T23:31:11.074ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339402025-03-07T23:31:11.077ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
339412025-03-07T23:31:11.077ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
339422025-03-07T23:31:11.077ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339432025-03-07T23:31:11.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339442025-03-07T23:31:11.077ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339452025-03-07T23:31:11.079ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
339462025-03-07T23:31:11.080ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
339472025-03-07T23:31:11.080ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
339482025-03-07T23:31:11.080ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
339492025-03-07T23:31:11.082ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
339502025-03-07T23:31:11.086ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
339512025-03-07T23:31:11.086ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339522025-03-07T23:31:11.086ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339532025-03-07T23:31:11.086ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339542025-03-07T23:31:11.087ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339552025-03-07T23:31:11.092ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
339562025-03-07T23:31:11.092ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
339572025-03-07T23:31:11.092ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
339582025-03-07T23:31:11.092ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339592025-03-07T23:31:11.093ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339602025-03-07T23:31:11.093ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339612025-03-07T23:31:11.097ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339622025-03-07T23:31:11.097ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339632025-03-07T23:31:11.098ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339642025-03-07T23:31:11.100ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339652025-03-07T23:31:11.100ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339662025-03-07T23:31:11.100ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339672025-03-07T23:31:11.100ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339682025-03-07T23:31:11.101ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339692025-03-07T23:31:11.104ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339702025-03-07T23:31:11.104ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339712025-03-07T23:31:11.104ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339722025-03-07T23:31:11.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339732025-03-07T23:31:11.108ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339742025-03-07T23:31:11.108ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339752025-03-07T23:31:11.108ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339762025-03-07T23:31:11.109ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339772025-03-07T23:31:11.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339782025-03-07T23:31:11.145ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339792025-03-07T23:31:11.145ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 91463 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 381a6265-b47d-47af-b8d8-8af5bb151d5b response_code = 404 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339802025-03-07T23:31:11.146ZINFOtest_unauthorized (external client test context): client received response status = 404
339812025-03-07T23:31:11.146ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339822025-03-07T23:31:11.146ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339832025-03-07T23:31:11.146ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aecb8153-f615-4f30-9941-7ded91290ee1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339842025-03-07T23:31:11.147ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aecb8153-f615-4f30-9941-7ded91290ee1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339852025-03-07T23:31:11.147ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aecb8153-f615-4f30-9941-7ded91290ee1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339862025-03-07T23:31:11.147ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aecb8153-f615-4f30-9941-7ded91290ee1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339872025-03-07T23:31:11.147ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 371 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aecb8153-f615-4f30-9941-7ded91290ee1 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339882025-03-07T23:31:11.147ZINFOtest_unauthorized (external client test context): client received response status = 401
339892025-03-07T23:31:11.147ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339902025-03-07T23:31:11.147ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339912025-03-07T23:31:11.147ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b238cf21-ae36-4298-adf0-5642ab51344c uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339922025-03-07T23:31:11.148ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b238cf21-ae36-4298-adf0-5642ab51344c uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339932025-03-07T23:31:11.148ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b238cf21-ae36-4298-adf0-5642ab51344c uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339942025-03-07T23:31:11.148ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 236 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b238cf21-ae36-4298-adf0-5642ab51344c response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339952025-03-07T23:31:11.148ZINFOtest_unauthorized (external client test context): client received response status = 401
339962025-03-07T23:31:11.148ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339972025-03-07T23:31:11.148ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339982025-03-07T23:31:11.148ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3b16f35-4b7c-4a89-b3b7-266b35c6b183 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
339992025-03-07T23:31:11.148ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3b16f35-4b7c-4a89-b3b7-266b35c6b183 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340002025-03-07T23:31:11.150ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:1978:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:1997:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_bulk_write_import_stop::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3b16f35-4b7c-4a89-b3b7-266b35c6b183 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340012025-03-07T23:31:11.150ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1057 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f3b16f35-4b7c-4a89-b3b7-266b35c6b183 response_code = 401 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340022025-03-07T23:31:11.150ZINFOtest_unauthorized (external client test context): client received response status = 401
340032025-03-07T23:31:11.150ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340042025-03-07T23:31:11.150ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340052025-03-07T23:31:11.150ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1577731b-1219-4549-a564-9b7449dd033d uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340062025-03-07T23:31:11.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1577731b-1219-4549-a564-9b7449dd033d response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340072025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client received response status = 405
340082025-03-07T23:31:11.151ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340092025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340102025-03-07T23:31:11.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3e8be889-b38c-495c-82a9-574bfa57fc37 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340112025-03-07T23:31:11.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 3e8be889-b38c-495c-82a9-574bfa57fc37 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340122025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client received response status = 405
340132025-03-07T23:31:11.151ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340142025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340152025-03-07T23:31:11.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d37bbbce-cf0c-4b65-90e3-dcb266dd5057 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340162025-03-07T23:31:11.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d37bbbce-cf0c-4b65-90e3-dcb266dd5057 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340172025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client received response status = 405
340182025-03-07T23:31:11.151ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340192025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340202025-03-07T23:31:11.151ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ef8a26c5-c6ca-4708-9b30-efd8df8f9ca4 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340212025-03-07T23:31:11.151ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ef8a26c5-c6ca-4708-9b30-efd8df8f9ca4 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340222025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client received response status = 405
340232025-03-07T23:31:11.151ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340242025-03-07T23:31:11.151ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340252025-03-07T23:31:11.152ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d8c9f83e-77c6-42b1-ac2d-1306fc399528 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340262025-03-07T23:31:11.152ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d8c9f83e-77c6-42b1-ac2d-1306fc399528 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340272025-03-07T23:31:11.152ZINFOtest_unauthorized (external client test context): client received response status = 405
340282025-03-07T23:31:11.152ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340292025-03-07T23:31:11.152ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340302025-03-07T23:31:11.153ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8103e2ee-73fe-467e-95a0-235846f29d56 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340312025-03-07T23:31:11.153ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 481 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8103e2ee-73fe-467e-95a0-235846f29d56 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340322025-03-07T23:31:11.153ZINFOtest_unauthorized (external client test context): client received response status = 405
340332025-03-07T23:31:11.153ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340342025-03-07T23:31:11.153ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340352025-03-07T23:31:11.153ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 759eddc7-9fcb-4e27-b37b-3b01e61f8321 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340362025-03-07T23:31:11.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 759eddc7-9fcb-4e27-b37b-3b01e61f8321 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340372025-03-07T23:31:11.154ZINFOtest_unauthorized (external client test context): client received response status = 405
340382025-03-07T23:31:11.154ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340392025-03-07T23:31:11.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340402025-03-07T23:31:11.154ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 30c98d00-1392-4a7e-b02c-a76a66744ab1 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340412025-03-07T23:31:11.154ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 30c98d00-1392-4a7e-b02c-a76a66744ab1 response_code = 405 uri = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340422025-03-07T23:31:11.154ZINFOtest_unauthorized (external client test context): client received response status = 405
340432025-03-07T23:31:11.154ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/bulk-write-stop?project=demo-project
340442025-03-07T23:31:11.154ZINFOtest_unauthorized: test: begin endpoint url = /v1/disks/demo-import-disk/finalize?project=demo-project
340452025-03-07T23:31:11.154ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/disks/demo-import-disk/finalize?project=demo-project
340462025-03-07T23:31:11.154ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
340472025-03-07T23:31:11.154ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340482025-03-07T23:31:11.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6e617df8-4f00-4076-8553-09f7a28f49d0 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340492025-03-07T23:31:11.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 73 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6e617df8-4f00-4076-8553-09f7a28f49d0 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340502025-03-07T23:31:11.155ZINFOtest_unauthorized (external client test context): client received response status = 405
340512025-03-07T23:31:11.155ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
340522025-03-07T23:31:11.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340532025-03-07T23:31:11.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0dd1006-ce7b-4349-95cc-525768766b51 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340542025-03-07T23:31:11.155ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f0dd1006-ce7b-4349-95cc-525768766b51 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340552025-03-07T23:31:11.155ZINFOtest_unauthorized (external client test context): client received response status = 405
340562025-03-07T23:31:11.155ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
340572025-03-07T23:31:11.155ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340582025-03-07T23:31:11.155ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c5983f92-ba09-4031-a11a-ba62c0d15b52 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340592025-03-07T23:31:11.156ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c5983f92-ba09-4031-a11a-ba62c0d15b52 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340602025-03-07T23:31:11.156ZINFOtest_unauthorized (external client test context): client received response status = 405
340612025-03-07T23:31:11.156ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/disks/demo-import-disk/finalize?project=demo-project
340622025-03-07T23:31:11.156ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340632025-03-07T23:31:11.156ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
340642025-03-07T23:31:11.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
340652025-03-07T23:31:11.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
340662025-03-07T23:31:11.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
340672025-03-07T23:31:11.157ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7b03225b-5896-4e74-ada7-6fe6480c99de uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340682025-03-07T23:31:11.157ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7b03225b-5896-4e74-ada7-6fe6480c99de response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340692025-03-07T23:31:11.158ZINFOtest_unauthorized (external client test context): client received response status = 405
340702025-03-07T23:31:11.158ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
340712025-03-07T23:31:11.158ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340722025-03-07T23:31:11.158ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = be86db20-edc1-4a8f-9772-d840f6f951b1 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340732025-03-07T23:31:11.158ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = be86db20-edc1-4a8f-9772-d840f6f951b1 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340742025-03-07T23:31:11.158ZINFOtest_unauthorized (external client test context): client received response status = 405
340752025-03-07T23:31:11.158ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
340762025-03-07T23:31:11.158ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340772025-03-07T23:31:11.158ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e445c97f-f3ab-478d-9abb-40ff284d23ca uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340782025-03-07T23:31:11.158ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e445c97f-f3ab-478d-9abb-40ff284d23ca response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340792025-03-07T23:31:11.159ZINFOtest_unauthorized (external client test context): client received response status = 405
340802025-03-07T23:31:11.159ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
340812025-03-07T23:31:11.159ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340822025-03-07T23:31:11.159ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 321b3ae9-e79f-42a9-b360-e30d01e38ec9 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340832025-03-07T23:31:11.159ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 321b3ae9-e79f-42a9-b360-e30d01e38ec9 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340842025-03-07T23:31:11.159ZINFOtest_unauthorized (external client test context): client received response status = 405
340852025-03-07T23:31:11.160ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/disks/demo-import-disk/finalize?project=demo-project
340862025-03-07T23:31:11.160ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340872025-03-07T23:31:11.160ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 08bdb855-d5d2-441f-8c30-c55de06094df uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340882025-03-07T23:31:11.160ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 08bdb855-d5d2-441f-8c30-c55de06094df response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340892025-03-07T23:31:11.160ZINFOtest_unauthorized (external client test context): client received response status = 405
340902025-03-07T23:31:11.160ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
340912025-03-07T23:31:11.160ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
340922025-03-07T23:31:11.160ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340932025-03-07T23:31:11.161ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340942025-03-07T23:31:11.161ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
340952025-03-07T23:31:11.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
340962025-03-07T23:31:11.161ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
340972025-03-07T23:31:11.161ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
340982025-03-07T23:31:11.162ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
340992025-03-07T23:31:11.162ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
341002025-03-07T23:31:11.170ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
341012025-03-07T23:31:11.170ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
341022025-03-07T23:31:11.170ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341032025-03-07T23:31:11.170ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341042025-03-07T23:31:11.170ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341052025-03-07T23:31:11.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
341062025-03-07T23:31:11.176ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
341072025-03-07T23:31:11.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341082025-03-07T23:31:11.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341092025-03-07T23:31:11.177ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341102025-03-07T23:31:11.179ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
341112025-03-07T23:31:11.179ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341122025-03-07T23:31:11.179ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341132025-03-07T23:31:11.181ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341142025-03-07T23:31:11.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
341152025-03-07T23:31:11.190ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
341162025-03-07T23:31:11.190ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341172025-03-07T23:31:11.190ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341182025-03-07T23:31:11.191ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341192025-03-07T23:31:11.197ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
341202025-03-07T23:31:11.197ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
341212025-03-07T23:31:11.197ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341222025-03-07T23:31:11.197ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341232025-03-07T23:31:11.199ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341242025-03-07T23:31:11.201ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
341252025-03-07T23:31:11.201ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
341262025-03-07T23:31:11.201ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
341272025-03-07T23:31:11.202ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
341282025-03-07T23:31:11.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
341292025-03-07T23:31:11.209ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
341302025-03-07T23:31:11.210ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341312025-03-07T23:31:11.211ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341322025-03-07T23:31:11.211ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341332025-03-07T23:31:11.212ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341342025-03-07T23:31:11.215ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341352025-03-07T23:31:11.215ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341362025-03-07T23:31:11.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341372025-03-07T23:31:11.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341382025-03-07T23:31:11.226ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341392025-03-07T23:31:11.227ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341402025-03-07T23:31:11.274ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
341412025-03-07T23:31:11.286ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341422025-03-07T23:31:11.286ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341432025-03-07T23:31:11.286ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341442025-03-07T23:31:11.286ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341452025-03-07T23:31:11.288ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341462025-03-07T23:31:11.313ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341472025-03-07T23:31:11.313ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341482025-03-07T23:31:11.313ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341492025-03-07T23:31:11.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341502025-03-07T23:31:11.335ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341512025-03-07T23:31:11.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341522025-03-07T23:31:11.336ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341532025-03-07T23:31:11.337ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Database result = Ok(()) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341542025-03-07T23:31:11.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c roles = RoleSet { roles: {} } uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341552025-03-07T23:31:11.364ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c resource = Disk { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: b3a45edc-9cb4-4b82-adf1-62d15bef5089, lookup_type: ByName("demo-import-disk") } result = Err(ObjectNotFound { type_name: Disk, lookup_type: ByName("demo-import-disk") }) uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341562025-03-07T23:31:11.365ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: disk with name "demo-import-disk" error_message_internal = not found: disk with name "demo-import-disk" latency_us = 204487 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b5430a3c-0296-4fc4-bf75-74482a6d531c response_code = 404 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341572025-03-07T23:31:11.365ZINFOtest_unauthorized (external client test context): client received response status = 404
341582025-03-07T23:31:11.366ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
341592025-03-07T23:31:11.366ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341602025-03-07T23:31:11.366ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e338e92-bf4e-4d4d-ba9d-4884909b519e uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341612025-03-07T23:31:11.367ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e338e92-bf4e-4d4d-ba9d-4884909b519e uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341622025-03-07T23:31:11.367ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e338e92-bf4e-4d4d-ba9d-4884909b519e uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341632025-03-07T23:31:11.367ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e338e92-bf4e-4d4d-ba9d-4884909b519e uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341642025-03-07T23:31:11.367ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 756 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 9e338e92-bf4e-4d4d-ba9d-4884909b519e response_code = 401 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341652025-03-07T23:31:11.368ZINFOtest_unauthorized (external client test context): client received response status = 401
341662025-03-07T23:31:11.368ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
341672025-03-07T23:31:11.368ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341682025-03-07T23:31:11.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 473a98e2-30be-4806-9efb-2e221367a516 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341692025-03-07T23:31:11.368ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 473a98e2-30be-4806-9efb-2e221367a516 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341702025-03-07T23:31:11.369ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 473a98e2-30be-4806-9efb-2e221367a516 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341712025-03-07T23:31:11.369ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 598 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 473a98e2-30be-4806-9efb-2e221367a516 response_code = 401 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341722025-03-07T23:31:11.369ZINFOtest_unauthorized (external client test context): client received response status = 401
341732025-03-07T23:31:11.369ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/disks/demo-import-disk/finalize?project=demo-project
341742025-03-07T23:31:11.369ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341752025-03-07T23:31:11.370ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 195f997e-800e-436e-a64a-9d8bf66de296 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341762025-03-07T23:31:11.370ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 195f997e-800e-436e-a64a-9d8bf66de296 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341772025-03-07T23:31:11.373ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2009:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseUpdatedNoContent> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2028:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn_env#0}, dropshot::handler::HttpResponseUpdatedNoContent, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::disk_finalize_import::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::DiskPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::FinalizeDisk>), dropshot::handler::HttpResponseUpdatedNoContent> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 195f997e-800e-436e-a64a-9d8bf66de296 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341782025-03-07T23:31:11.374ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3776 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 195f997e-800e-436e-a64a-9d8bf66de296 response_code = 401 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341792025-03-07T23:31:11.374ZINFOtest_unauthorized (external client test context): client received response status = 401
341802025-03-07T23:31:11.375ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
341812025-03-07T23:31:11.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341822025-03-07T23:31:11.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 778aca54-0238-4bbb-8535-acec4cea2215 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341832025-03-07T23:31:11.375ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 234 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 778aca54-0238-4bbb-8535-acec4cea2215 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341842025-03-07T23:31:11.375ZINFOtest_unauthorized (external client test context): client received response status = 405
341852025-03-07T23:31:11.376ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
341862025-03-07T23:31:11.376ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341872025-03-07T23:31:11.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6660dbec-6024-4bc6-b986-ea882f091b5a uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341882025-03-07T23:31:11.377ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 180 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6660dbec-6024-4bc6-b986-ea882f091b5a response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341892025-03-07T23:31:11.377ZINFOtest_unauthorized (external client test context): client received response status = 405
341902025-03-07T23:31:11.377ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
341912025-03-07T23:31:11.377ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341922025-03-07T23:31:11.378ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d79f5850-ea9b-47fb-b10c-e1eb3a3595b8 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341932025-03-07T23:31:11.378ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 153 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d79f5850-ea9b-47fb-b10c-e1eb3a3595b8 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341942025-03-07T23:31:11.378ZINFOtest_unauthorized (external client test context): client received response status = 405
341952025-03-07T23:31:11.378ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/disks/demo-import-disk/finalize?project=demo-project
341962025-03-07T23:31:11.379ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
341972025-03-07T23:31:11.379ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d2f4377d-48f7-4b15-b700-0ce9c6eaf7e5 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341982025-03-07T23:31:11.379ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 160 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = d2f4377d-48f7-4b15-b700-0ce9c6eaf7e5 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
341992025-03-07T23:31:11.380ZINFOtest_unauthorized (external client test context): client received response status = 405
342002025-03-07T23:31:11.380ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
342012025-03-07T23:31:11.380ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
342022025-03-07T23:31:11.381ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3945f95e-c55a-4052-afab-7d5f241ff8f4 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342032025-03-07T23:31:11.381ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3945f95e-c55a-4052-afab-7d5f241ff8f4 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342042025-03-07T23:31:11.381ZINFOtest_unauthorized (external client test context): client received response status = 405
342052025-03-07T23:31:11.381ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
342062025-03-07T23:31:11.381ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
342072025-03-07T23:31:11.381ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 74d75d95-ed7f-493a-be39-cc81365d2b48 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342082025-03-07T23:31:11.381ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 89 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 74d75d95-ed7f-493a-be39-cc81365d2b48 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342092025-03-07T23:31:11.383ZINFOtest_unauthorized (external client test context): client received response status = 405
342102025-03-07T23:31:11.383ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
342112025-03-07T23:31:11.383ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
342122025-03-07T23:31:11.384ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 706c3571-2ce6-4b25-948c-18bf8c7c4deb uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342132025-03-07T23:31:11.384ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 191 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 706c3571-2ce6-4b25-948c-18bf8c7c4deb response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342142025-03-07T23:31:11.384ZINFOtest_unauthorized (external client test context): client received response status = 405
342152025-03-07T23:31:11.384ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/disks/demo-import-disk/finalize?project=demo-project
342162025-03-07T23:31:11.385ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/disks/demo-import-disk/finalize?project=demo-project
342172025-03-07T23:31:11.385ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 55bfb22f-0d0c-4b6e-aca8-555af5cee080 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342182025-03-07T23:31:11.385ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 55bfb22f-0d0c-4b6e-aca8-555af5cee080 response_code = 405 uri = /v1/disks/demo-import-disk/finalize?project=demo-project
342192025-03-07T23:31:11.385ZINFOtest_unauthorized (external client test context): client received response status = 405
342202025-03-07T23:31:11.385ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/disks/demo-import-disk/finalize?project=demo-project
342212025-03-07T23:31:11.386ZINFOtest_unauthorized: test: begin endpoint url = /v1/images?project=demo-project
342222025-03-07T23:31:11.386ZINFOtest_unauthorized: test: privileged GET url = /v1/images?project=demo-project
342232025-03-07T23:31:11.386ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images?project=demo-project
342242025-03-07T23:31:11.386ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 uri = /v1/images?project=demo-project
342252025-03-07T23:31:11.386ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 uri = /v1/images?project=demo-project
342262025-03-07T23:31:11.386ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images?project=demo-project
342272025-03-07T23:31:11.386ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342282025-03-07T23:31:11.386ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342292025-03-07T23:31:11.388ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342302025-03-07T23:31:11.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342312025-03-07T23:31:11.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342322025-03-07T23:31:11.392ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342332025-03-07T23:31:11.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
342342025-03-07T23:31:11.397ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
342352025-03-07T23:31:11.397ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342362025-03-07T23:31:11.397ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342372025-03-07T23:31:11.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342382025-03-07T23:31:11.406ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
342392025-03-07T23:31:11.406ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342402025-03-07T23:31:11.406ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342412025-03-07T23:31:11.407ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342422025-03-07T23:31:11.415ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
342432025-03-07T23:31:11.415ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
342442025-03-07T23:31:11.416ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 87fec8c8-7990-4a7f-9bb7-188ee3371803 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
342452025-03-07T23:31:11.416ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 87fec8c8-7990-4a7f-9bb7-188ee3371803 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
342462025-03-07T23:31:11.416ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 87fec8c8-7990-4a7f-9bb7-188ee3371803 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
342472025-03-07T23:31:11.417ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 87fec8c8-7990-4a7f-9bb7-188ee3371803 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
342482025-03-07T23:31:11.417ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
342492025-03-07T23:31:11.421ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
342502025-03-07T23:31:11.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342512025-03-07T23:31:11.422ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342522025-03-07T23:31:11.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342532025-03-07T23:31:11.426ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 9808 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 87fec8c8-7990-4a7f-9bb7-188ee3371803 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
342542025-03-07T23:31:11.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
342552025-03-07T23:31:11.426ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
342562025-03-07T23:31:11.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342572025-03-07T23:31:11.426ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342582025-03-07T23:31:11.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342592025-03-07T23:31:11.428ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "87fec8c8-7990-4a7f-9bb7-188ee3371803", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:11 GMT"} })
342602025-03-07T23:31:11.428ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
342612025-03-07T23:31:11.428ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 70ab4c14-66b4-4a1d-9974-a5f8330f42de uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
342622025-03-07T23:31:11.429ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 70ab4c14-66b4-4a1d-9974-a5f8330f42de resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
342632025-03-07T23:31:11.429ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 70ab4c14-66b4-4a1d-9974-a5f8330f42de roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
342642025-03-07T23:31:11.432ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 70ab4c14-66b4-4a1d-9974-a5f8330f42de resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
342652025-03-07T23:31:11.432ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
342662025-03-07T23:31:11.432ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
342672025-03-07T23:31:11.432ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
342682025-03-07T23:31:11.432ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
342692025-03-07T23:31:11.432ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 3386 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 70ab4c14-66b4-4a1d-9974-a5f8330f42de response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
342702025-03-07T23:31:11.432ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "70ab4c14-66b4-4a1d-9974-a5f8330f42de", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:11 GMT"} })
342712025-03-07T23:31:11.432ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
342722025-03-07T23:31:11.432ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
342732025-03-07T23:31:11.432ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
342742025-03-07T23:31:11.433ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
342752025-03-07T23:31:11.436ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
342762025-03-07T23:31:11.437ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 uri = /v1/images?project=demo-project
342772025-03-07T23:31:11.437ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
342782025-03-07T23:31:11.437ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
342792025-03-07T23:31:11.437ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
342802025-03-07T23:31:11.442ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
342812025-03-07T23:31:11.442ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
342822025-03-07T23:31:11.443ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
342832025-03-07T23:31:11.445ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
342842025-03-07T23:31:11.446ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
342852025-03-07T23:31:11.446ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
342862025-03-07T23:31:11.446ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
342872025-03-07T23:31:11.446ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
342882025-03-07T23:31:11.460ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
342892025-03-07T23:31:11.460ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
342902025-03-07T23:31:11.461ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
342912025-03-07T23:31:11.462ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
342922025-03-07T23:31:11.470ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
342932025-03-07T23:31:11.471ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
342942025-03-07T23:31:11.471ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
342952025-03-07T23:31:11.472ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
342962025-03-07T23:31:11.485ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
342972025-03-07T23:31:11.497ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
342982025-03-07T23:31:11.497ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
342992025-03-07T23:31:11.498ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
343002025-03-07T23:31:11.498ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
343012025-03-07T23:31:11.498ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343022025-03-07T23:31:11.499ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343032025-03-07T23:31:11.503ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
343042025-03-07T23:31:11.503ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
343052025-03-07T23:31:11.503ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343062025-03-07T23:31:11.504ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343072025-03-07T23:31:11.509ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
343082025-03-07T23:31:11.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
343092025-03-07T23:31:11.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343102025-03-07T23:31:11.511ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343112025-03-07T23:31:11.515ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
343122025-03-07T23:31:11.524ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
343132025-03-07T23:31:11.524ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database uri = /v1/images?project=demo-project
343142025-03-07T23:31:11.524ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343152025-03-07T23:31:11.525ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343162025-03-07T23:31:11.532ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 146413 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 14481d3f-e834-4e6c-99a3-92714d756164 response_code = 200 uri = /v1/images?project=demo-project
343172025-03-07T23:31:11.533ZINFOtest_unauthorized (external client test context): client received response status = 200
343182025-03-07T23:31:11.533ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images?project=demo-project
343192025-03-07T23:31:11.533ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images?project=demo-project
343202025-03-07T23:31:11.533ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 uri = /v1/images?project=demo-project
343212025-03-07T23:31:11.534ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 uri = /v1/images?project=demo-project
343222025-03-07T23:31:11.534ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images?project=demo-project
343232025-03-07T23:31:11.534ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343242025-03-07T23:31:11.534ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343252025-03-07T23:31:11.535ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343262025-03-07T23:31:11.538ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343272025-03-07T23:31:11.538ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343282025-03-07T23:31:11.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343292025-03-07T23:31:11.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
343302025-03-07T23:31:11.546ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
343312025-03-07T23:31:11.546ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343322025-03-07T23:31:11.546ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343332025-03-07T23:31:11.549ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343342025-03-07T23:31:11.557ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
343352025-03-07T23:31:11.557ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343362025-03-07T23:31:11.557ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343372025-03-07T23:31:11.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343382025-03-07T23:31:11.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
343392025-03-07T23:31:11.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
343402025-03-07T23:31:11.571ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
343412025-03-07T23:31:11.579ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
343422025-03-07T23:31:11.579ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343432025-03-07T23:31:11.579ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343442025-03-07T23:31:11.580ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343452025-03-07T23:31:11.581ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
343462025-03-07T23:31:11.583ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
343472025-03-07T23:31:11.583ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
343482025-03-07T23:31:11.583ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
343492025-03-07T23:31:11.584ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
343502025-03-07T23:31:11.584ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
343512025-03-07T23:31:11.585ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343522025-03-07T23:31:11.585ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343532025-03-07T23:31:11.586ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343542025-03-07T23:31:11.588ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
343552025-03-07T23:31:11.588ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
343562025-03-07T23:31:11.589ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
343572025-03-07T23:31:11.591ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
343582025-03-07T23:31:11.595ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
343592025-03-07T23:31:11.603ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
343602025-03-07T23:31:11.603ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 uri = /v1/images?project=demo-project
343612025-03-07T23:31:11.603ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database uri = /v1/images?project=demo-project
343622025-03-07T23:31:11.603ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343632025-03-07T23:31:11.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343642025-03-07T23:31:11.610ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database uri = /v1/images?project=demo-project
343652025-03-07T23:31:11.610ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343662025-03-07T23:31:11.612ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343672025-03-07T23:31:11.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
343682025-03-07T23:31:11.616ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
343692025-03-07T23:31:11.616ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database uri = /v1/images?project=demo-project
343702025-03-07T23:31:11.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343712025-03-07T23:31:11.617ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343722025-03-07T23:31:11.621ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
343732025-03-07T23:31:11.621ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database uri = /v1/images?project=demo-project
343742025-03-07T23:31:11.621ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343752025-03-07T23:31:11.622ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343762025-03-07T23:31:11.625ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
343772025-03-07T23:31:11.625ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database uri = /v1/images?project=demo-project
343782025-03-07T23:31:11.625ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343792025-03-07T23:31:11.626ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Database result = Ok(()) uri = /v1/images?project=demo-project
343802025-03-07T23:31:11.630ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
343812025-03-07T23:31:11.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/images?project=demo-project
343822025-03-07T23:31:11.660ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 127044 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6ec69d17-6cab-4e73-b8bd-868e25538be1 response_code = 404 uri = /v1/images?project=demo-project
343832025-03-07T23:31:11.661ZINFOtest_unauthorized (external client test context): client received response status = 404
343842025-03-07T23:31:11.661ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images?project=demo-project
343852025-03-07T23:31:11.661ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images?project=demo-project
343862025-03-07T23:31:11.661ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b67bc9e3-6dab-4853-b341-5e9c8d872b2f uri = /v1/images?project=demo-project
343872025-03-07T23:31:11.661ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b67bc9e3-6dab-4853-b341-5e9c8d872b2f uri = /v1/images?project=demo-project
343882025-03-07T23:31:11.661ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b67bc9e3-6dab-4853-b341-5e9c8d872b2f uri = /v1/images?project=demo-project
343892025-03-07T23:31:11.661ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b67bc9e3-6dab-4853-b341-5e9c8d872b2f uri = /v1/images?project=demo-project
343902025-03-07T23:31:11.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 314 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b67bc9e3-6dab-4853-b341-5e9c8d872b2f response_code = 401 uri = /v1/images?project=demo-project
343912025-03-07T23:31:11.662ZINFOtest_unauthorized (external client test context): client received response status = 401
343922025-03-07T23:31:11.663ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images?project=demo-project
343932025-03-07T23:31:11.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images?project=demo-project
343942025-03-07T23:31:11.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 189cd311-4719-4e37-85cf-d483037dcf93 uri = /v1/images?project=demo-project
343952025-03-07T23:31:11.663ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 189cd311-4719-4e37-85cf-d483037dcf93 uri = /v1/images?project=demo-project
343962025-03-07T23:31:11.663ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 189cd311-4719-4e37-85cf-d483037dcf93 uri = /v1/images?project=demo-project
343972025-03-07T23:31:11.663ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 174 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 189cd311-4719-4e37-85cf-d483037dcf93 response_code = 401 uri = /v1/images?project=demo-project
343982025-03-07T23:31:11.663ZINFOtest_unauthorized (external client test context): client received response status = 401
343992025-03-07T23:31:11.663ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images?project=demo-project
344002025-03-07T23:31:11.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images?project=demo-project
344012025-03-07T23:31:11.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4fc0f2ba-cec7-4208-9108-f5ca8e9a153f uri = /v1/images?project=demo-project
344022025-03-07T23:31:11.663ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4fc0f2ba-cec7-4208-9108-f5ca8e9a153f uri = /v1/images?project=demo-project
344032025-03-07T23:31:11.666ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4297:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Image>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4332:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Image>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Image>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4fc0f2ba-cec7-4208-9108-f5ca8e9a153f uri = /v1/images?project=demo-project
344042025-03-07T23:31:11.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1143 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4fc0f2ba-cec7-4208-9108-f5ca8e9a153f response_code = 401 uri = /v1/images?project=demo-project
344052025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client received response status = 401
344062025-03-07T23:31:11.667ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images?project=demo-project
344072025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images?project=demo-project
344082025-03-07T23:31:11.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d4169d14-8923-4f28-b4ae-f4d19e46cd8b uri = /v1/images?project=demo-project
344092025-03-07T23:31:11.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d4169d14-8923-4f28-b4ae-f4d19e46cd8b response_code = 405 uri = /v1/images?project=demo-project
344102025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client received response status = 405
344112025-03-07T23:31:11.667ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images?project=demo-project
344122025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images?project=demo-project
344132025-03-07T23:31:11.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0f019d5e-4555-40b1-b585-061be83ece26 uri = /v1/images?project=demo-project
344142025-03-07T23:31:11.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0f019d5e-4555-40b1-b585-061be83ece26 response_code = 405 uri = /v1/images?project=demo-project
344152025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client received response status = 405
344162025-03-07T23:31:11.667ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images?project=demo-project
344172025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images?project=demo-project
344182025-03-07T23:31:11.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 112374b1-240b-443e-8c06-4b5d61236c12 uri = /v1/images?project=demo-project
344192025-03-07T23:31:11.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 112374b1-240b-443e-8c06-4b5d61236c12 response_code = 405 uri = /v1/images?project=demo-project
344202025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client received response status = 405
344212025-03-07T23:31:11.667ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images?project=demo-project
344222025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images?project=demo-project
344232025-03-07T23:31:11.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ffb3486e-9c35-4b87-b2eb-d7888e8d8569 uri = /v1/images?project=demo-project
344242025-03-07T23:31:11.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ffb3486e-9c35-4b87-b2eb-d7888e8d8569 response_code = 405 uri = /v1/images?project=demo-project
344252025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client received response status = 405
344262025-03-07T23:31:11.667ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images?project=demo-project
344272025-03-07T23:31:11.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images?project=demo-project
344282025-03-07T23:31:11.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c uri = /v1/images?project=demo-project
344292025-03-07T23:31:11.667ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c uri = /v1/images?project=demo-project
344302025-03-07T23:31:11.667ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images?project=demo-project
344312025-03-07T23:31:11.667ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344322025-03-07T23:31:11.667ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344332025-03-07T23:31:11.668ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344342025-03-07T23:31:11.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344352025-03-07T23:31:11.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344362025-03-07T23:31:11.677ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344372025-03-07T23:31:11.681ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
344382025-03-07T23:31:11.681ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
344392025-03-07T23:31:11.681ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344402025-03-07T23:31:11.681ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344412025-03-07T23:31:11.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344422025-03-07T23:31:11.689ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
344432025-03-07T23:31:11.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344442025-03-07T23:31:11.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344452025-03-07T23:31:11.689ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344462025-03-07T23:31:11.694ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
344472025-03-07T23:31:11.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
344482025-03-07T23:31:11.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344492025-03-07T23:31:11.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344502025-03-07T23:31:11.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344512025-03-07T23:31:11.708ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
344522025-03-07T23:31:11.708ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
344532025-03-07T23:31:11.708ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344542025-03-07T23:31:11.708ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344552025-03-07T23:31:11.709ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344562025-03-07T23:31:11.715ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
344572025-03-07T23:31:11.715ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
344582025-03-07T23:31:11.715ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
344592025-03-07T23:31:11.716ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
344602025-03-07T23:31:11.721ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
344612025-03-07T23:31:11.730ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
344622025-03-07T23:31:11.730ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c uri = /v1/images?project=demo-project
344632025-03-07T23:31:11.730ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database uri = /v1/images?project=demo-project
344642025-03-07T23:31:11.730ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
344652025-03-07T23:31:11.731ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database result = Ok(()) uri = /v1/images?project=demo-project
344662025-03-07T23:31:11.733ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database uri = /v1/images?project=demo-project
344672025-03-07T23:31:11.734ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
344682025-03-07T23:31:11.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database result = Ok(()) uri = /v1/images?project=demo-project
344692025-03-07T23:31:11.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
344702025-03-07T23:31:11.737ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
344712025-03-07T23:31:11.737ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database uri = /v1/images?project=demo-project
344722025-03-07T23:31:11.737ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
344732025-03-07T23:31:11.738ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database result = Ok(()) uri = /v1/images?project=demo-project
344742025-03-07T23:31:11.750ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
344752025-03-07T23:31:11.750ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database uri = /v1/images?project=demo-project
344762025-03-07T23:31:11.750ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
344772025-03-07T23:31:11.752ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database result = Ok(()) uri = /v1/images?project=demo-project
344782025-03-07T23:31:11.765ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
344792025-03-07T23:31:11.765ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database uri = /v1/images?project=demo-project
344802025-03-07T23:31:11.765ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
344812025-03-07T23:31:11.766ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Database result = Ok(()) uri = /v1/images?project=demo-project
344822025-03-07T23:31:11.779ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
344832025-03-07T23:31:11.800ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/images?project=demo-project
344842025-03-07T23:31:11.800ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 133224 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 97b86a96-e03c-46a8-a6ec-2bae1379091c response_code = 404 uri = /v1/images?project=demo-project
344852025-03-07T23:31:11.801ZINFOtest_unauthorized (external client test context): client received response status = 404
344862025-03-07T23:31:11.802ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images?project=demo-project
344872025-03-07T23:31:11.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images?project=demo-project
344882025-03-07T23:31:11.805ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0cf5709b-6d4a-4530-914d-73e00bf9d2cc uri = /v1/images?project=demo-project
344892025-03-07T23:31:11.805ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0cf5709b-6d4a-4530-914d-73e00bf9d2cc uri = /v1/images?project=demo-project
344902025-03-07T23:31:11.805ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0cf5709b-6d4a-4530-914d-73e00bf9d2cc uri = /v1/images?project=demo-project
344912025-03-07T23:31:11.805ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0cf5709b-6d4a-4530-914d-73e00bf9d2cc uri = /v1/images?project=demo-project
344922025-03-07T23:31:11.805ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 369 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 0cf5709b-6d4a-4530-914d-73e00bf9d2cc response_code = 401 uri = /v1/images?project=demo-project
344932025-03-07T23:31:11.807ZINFOtest_unauthorized (external client test context): client received response status = 401
344942025-03-07T23:31:11.807ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images?project=demo-project
344952025-03-07T23:31:11.808ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images?project=demo-project
344962025-03-07T23:31:11.809ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c85b8e4d-966a-4690-914c-016592cc1747 uri = /v1/images?project=demo-project
344972025-03-07T23:31:11.816ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c85b8e4d-966a-4690-914c-016592cc1747 uri = /v1/images?project=demo-project
344982025-03-07T23:31:11.816ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c85b8e4d-966a-4690-914c-016592cc1747 uri = /v1/images?project=demo-project
344992025-03-07T23:31:11.817ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 7328 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c85b8e4d-966a-4690-914c-016592cc1747 response_code = 401 uri = /v1/images?project=demo-project
345002025-03-07T23:31:11.821ZINFOtest_unauthorized (external client test context): client received response status = 401
345012025-03-07T23:31:11.821ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images?project=demo-project
345022025-03-07T23:31:11.821ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images?project=demo-project
345032025-03-07T23:31:11.821ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 52cf116b-3c57-4daf-9cc8-0e2757ff75bb uri = /v1/images?project=demo-project
345042025-03-07T23:31:11.822ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 52cf116b-3c57-4daf-9cc8-0e2757ff75bb uri = /v1/images?project=demo-project
345052025-03-07T23:31:11.824ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4343:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4368:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::ImageCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 52cf116b-3c57-4daf-9cc8-0e2757ff75bb uri = /v1/images?project=demo-project
345062025-03-07T23:31:11.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1775 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 52cf116b-3c57-4daf-9cc8-0e2757ff75bb response_code = 401 uri = /v1/images?project=demo-project
345072025-03-07T23:31:11.824ZINFOtest_unauthorized (external client test context): client received response status = 401
345082025-03-07T23:31:11.824ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images?project=demo-project
345092025-03-07T23:31:11.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345102025-03-07T23:31:11.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9ccbfba3-dcb9-4438-9057-6dcc98222648 uri = /v1/images?project=demo-project
345112025-03-07T23:31:11.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9ccbfba3-dcb9-4438-9057-6dcc98222648 response_code = 405 uri = /v1/images?project=demo-project
345122025-03-07T23:31:11.825ZINFOtest_unauthorized (external client test context): client received response status = 405
345132025-03-07T23:31:11.825ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images?project=demo-project
345142025-03-07T23:31:11.825ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345152025-03-07T23:31:11.825ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7e79875a-93ea-461b-8088-5c595dca6e6c uri = /v1/images?project=demo-project
345162025-03-07T23:31:11.825ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7e79875a-93ea-461b-8088-5c595dca6e6c response_code = 405 uri = /v1/images?project=demo-project
345172025-03-07T23:31:11.826ZINFOtest_unauthorized (external client test context): client received response status = 405
345182025-03-07T23:31:11.826ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images?project=demo-project
345192025-03-07T23:31:11.826ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345202025-03-07T23:31:11.826ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58acfce6-1dac-49aa-aa29-cc52db6bb71a uri = /v1/images?project=demo-project
345212025-03-07T23:31:11.826ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 58acfce6-1dac-49aa-aa29-cc52db6bb71a response_code = 405 uri = /v1/images?project=demo-project
345222025-03-07T23:31:11.826ZINFOtest_unauthorized (external client test context): client received response status = 405
345232025-03-07T23:31:11.826ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images?project=demo-project
345242025-03-07T23:31:11.826ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345252025-03-07T23:31:11.827ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4a05f566-51b0-4c99-a794-02d099d27957 uri = /v1/images?project=demo-project
345262025-03-07T23:31:11.827ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 4a05f566-51b0-4c99-a794-02d099d27957 response_code = 405 uri = /v1/images?project=demo-project
345272025-03-07T23:31:11.827ZINFOtest_unauthorized (external client test context): client received response status = 405
345282025-03-07T23:31:11.827ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images?project=demo-project
345292025-03-07T23:31:11.827ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345302025-03-07T23:31:11.827ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8c15e2cb-2023-45fe-905f-25e65823e1d7 uri = /v1/images?project=demo-project
345312025-03-07T23:31:11.827ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8c15e2cb-2023-45fe-905f-25e65823e1d7 response_code = 405 uri = /v1/images?project=demo-project
345322025-03-07T23:31:11.827ZINFOtest_unauthorized (external client test context): client received response status = 405
345332025-03-07T23:31:11.828ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images?project=demo-project
345342025-03-07T23:31:11.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345352025-03-07T23:31:11.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0024a422-ff8b-49cb-badd-1884a555026d uri = /v1/images?project=demo-project
345362025-03-07T23:31:11.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0024a422-ff8b-49cb-badd-1884a555026d response_code = 405 uri = /v1/images?project=demo-project
345372025-03-07T23:31:11.828ZINFOtest_unauthorized (external client test context): client received response status = 405
345382025-03-07T23:31:11.828ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images?project=demo-project
345392025-03-07T23:31:11.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345402025-03-07T23:31:11.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8e4e2793-f91c-4d3d-b9a2-75f7b6eedd85 uri = /v1/images?project=demo-project
345412025-03-07T23:31:11.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 8e4e2793-f91c-4d3d-b9a2-75f7b6eedd85 response_code = 405 uri = /v1/images?project=demo-project
345422025-03-07T23:31:11.829ZINFOtest_unauthorized (external client test context): client received response status = 405
345432025-03-07T23:31:11.829ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images?project=demo-project
345442025-03-07T23:31:11.829ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images?project=demo-project
345452025-03-07T23:31:11.829ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e4e377e4-08ac-4080-b783-5a2716750a37 uri = /v1/images?project=demo-project
345462025-03-07T23:31:11.829ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e4e377e4-08ac-4080-b783-5a2716750a37 response_code = 405 uri = /v1/images?project=demo-project
345472025-03-07T23:31:11.829ZINFOtest_unauthorized (external client test context): client received response status = 405
345482025-03-07T23:31:11.829ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images?project=demo-project
345492025-03-07T23:31:11.829ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images?project=demo-project
345502025-03-07T23:31:11.830ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a uri = /v1/images?project=demo-project
345512025-03-07T23:31:11.830ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a uri = /v1/images?project=demo-project
345522025-03-07T23:31:11.830ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images?project=demo-project
345532025-03-07T23:31:11.830ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345542025-03-07T23:31:11.830ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345552025-03-07T23:31:11.830ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345562025-03-07T23:31:11.833ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345572025-03-07T23:31:11.833ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345582025-03-07T23:31:11.834ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345592025-03-07T23:31:11.843ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
345602025-03-07T23:31:11.843ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
345612025-03-07T23:31:11.843ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345622025-03-07T23:31:11.843ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345632025-03-07T23:31:11.843ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345642025-03-07T23:31:11.855ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
345652025-03-07T23:31:11.855ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345662025-03-07T23:31:11.855ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345672025-03-07T23:31:11.861ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345682025-03-07T23:31:11.861ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
345692025-03-07T23:31:11.864ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
345702025-03-07T23:31:11.864ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345712025-03-07T23:31:11.864ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345722025-03-07T23:31:11.866ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345732025-03-07T23:31:11.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
345742025-03-07T23:31:11.872ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
345752025-03-07T23:31:11.872ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345762025-03-07T23:31:11.872ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345772025-03-07T23:31:11.872ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345782025-03-07T23:31:11.878ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
345792025-03-07T23:31:11.878ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
345802025-03-07T23:31:11.878ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
345812025-03-07T23:31:11.878ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
345822025-03-07T23:31:11.884ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
345832025-03-07T23:31:11.887ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
345842025-03-07T23:31:11.887ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a uri = /v1/images?project=demo-project
345852025-03-07T23:31:11.887ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
345862025-03-07T23:31:11.887ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
345872025-03-07T23:31:11.890ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
345882025-03-07T23:31:11.891ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
345892025-03-07T23:31:11.892ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
345902025-03-07T23:31:11.892ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
345912025-03-07T23:31:11.896ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
345922025-03-07T23:31:11.896ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
345932025-03-07T23:31:11.896ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
345942025-03-07T23:31:11.896ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
345952025-03-07T23:31:11.897ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
345962025-03-07T23:31:11.900ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
345972025-03-07T23:31:11.900ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
345982025-03-07T23:31:11.900ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
345992025-03-07T23:31:11.900ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
346002025-03-07T23:31:11.903ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
346012025-03-07T23:31:11.903ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
346022025-03-07T23:31:11.903ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
346032025-03-07T23:31:11.903ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
346042025-03-07T23:31:11.909ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
346052025-03-07T23:31:11.916ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
346062025-03-07T23:31:11.916ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/images?project=demo-project
346072025-03-07T23:31:11.917ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images?project=demo-project
346082025-03-07T23:31:11.917ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
346092025-03-07T23:31:11.917ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
346102025-03-07T23:31:11.917ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
346112025-03-07T23:31:11.920ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images?project=demo-project
346122025-03-07T23:31:11.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
346132025-03-07T23:31:11.920ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
346142025-03-07T23:31:11.920ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
346152025-03-07T23:31:11.924ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images?project=demo-project
346162025-03-07T23:31:11.924ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
346172025-03-07T23:31:11.924ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
346182025-03-07T23:31:11.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
346192025-03-07T23:31:11.928ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images?project=demo-project
346202025-03-07T23:31:11.938ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/images?project=demo-project
346212025-03-07T23:31:11.938ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database uri = /v1/images?project=demo-project
346222025-03-07T23:31:11.938ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a roles = RoleSet { roles: {} } uri = /v1/images?project=demo-project
346232025-03-07T23:31:11.938ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a resource = Database result = Ok(()) uri = /v1/images?project=demo-project
346242025-03-07T23:31:11.947ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 115508 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = ac2a8aca-42d1-4507-96df-541724ae679a response_code = 200 uri = /v1/images?project=demo-project
346252025-03-07T23:31:11.947ZINFOtest_unauthorized (external client test context): client received response status = 200
346262025-03-07T23:31:11.947ZINFOtest_unauthorized: test: begin endpoint url = /v1/images/demo-image?project=demo-project
346272025-03-07T23:31:11.947ZINFOtest_unauthorized: test: privileged GET url = /v1/images/demo-image?project=demo-project
346282025-03-07T23:31:11.947ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
346292025-03-07T23:31:11.947ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 uri = /v1/images/demo-image?project=demo-project
346302025-03-07T23:31:11.947ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 uri = /v1/images/demo-image?project=demo-project
346312025-03-07T23:31:11.947ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images/demo-image?project=demo-project
346322025-03-07T23:31:11.947ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346332025-03-07T23:31:11.947ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346342025-03-07T23:31:11.947ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346352025-03-07T23:31:11.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346362025-03-07T23:31:11.970ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346372025-03-07T23:31:11.970ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346382025-03-07T23:31:11.999ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
346392025-03-07T23:31:12.000ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
346402025-03-07T23:31:12.000ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346412025-03-07T23:31:12.000ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346422025-03-07T23:31:12.000ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346432025-03-07T23:31:12.018ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
346442025-03-07T23:31:12.018ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346452025-03-07T23:31:12.018ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346462025-03-07T23:31:12.018ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346472025-03-07T23:31:12.025ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
346482025-03-07T23:31:12.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
346492025-03-07T23:31:12.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346502025-03-07T23:31:12.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346512025-03-07T23:31:12.036ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346522025-03-07T23:31:12.047ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
346532025-03-07T23:31:12.047ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
346542025-03-07T23:31:12.047ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346552025-03-07T23:31:12.047ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346562025-03-07T23:31:12.048ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346572025-03-07T23:31:12.050ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
346582025-03-07T23:31:12.050ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
346592025-03-07T23:31:12.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
346602025-03-07T23:31:12.051ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
346612025-03-07T23:31:12.053ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
346622025-03-07T23:31:12.071ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
346632025-03-07T23:31:12.071ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 uri = /v1/images/demo-image?project=demo-project
346642025-03-07T23:31:12.072ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database uri = /v1/images/demo-image?project=demo-project
346652025-03-07T23:31:12.072ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
346662025-03-07T23:31:12.076ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346672025-03-07T23:31:12.093ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database uri = /v1/images/demo-image?project=demo-project
346682025-03-07T23:31:12.093ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
346692025-03-07T23:31:12.094ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346702025-03-07T23:31:12.098ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database uri = /v1/images/demo-image?project=demo-project
346712025-03-07T23:31:12.098ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
346722025-03-07T23:31:12.099ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346732025-03-07T23:31:12.103ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
346742025-03-07T23:31:12.103ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images/demo-image?project=demo-project
346752025-03-07T23:31:12.103ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database uri = /v1/images/demo-image?project=demo-project
346762025-03-07T23:31:12.103ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
346772025-03-07T23:31:12.105ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346782025-03-07T23:31:12.137ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
346792025-03-07T23:31:12.137ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database uri = /v1/images/demo-image?project=demo-project
346802025-03-07T23:31:12.138ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
346812025-03-07T23:31:12.140ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346822025-03-07T23:31:12.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
346832025-03-07T23:31:12.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
346842025-03-07T23:31:12.157ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
346852025-03-07T23:31:12.158ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database uri = /v1/images/demo-image?project=demo-project
346862025-03-07T23:31:12.158ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
346872025-03-07T23:31:12.163ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346882025-03-07T23:31:12.163ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
346892025-03-07T23:31:12.164ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
346902025-03-07T23:31:12.169ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images/demo-image?project=demo-project
346912025-03-07T23:31:12.191ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } result = Ok(()) uri = /v1/images/demo-image?project=demo-project
346922025-03-07T23:31:12.192ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 246222 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0e0a4716-bbc1-4a51-a8f4-88488c93d325 response_code = 200 uri = /v1/images/demo-image?project=demo-project
346932025-03-07T23:31:12.192ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
346942025-03-07T23:31:12.192ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
346952025-03-07T23:31:12.193ZINFOtest_unauthorized (external client test context): client received response status = 200
346962025-03-07T23:31:12.193ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images/demo-image?project=demo-project
346972025-03-07T23:31:12.193ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
346982025-03-07T23:31:12.194ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d uri = /v1/images/demo-image?project=demo-project
346992025-03-07T23:31:12.194ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d uri = /v1/images/demo-image?project=demo-project
347002025-03-07T23:31:12.194ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image?project=demo-project
347012025-03-07T23:31:12.194ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347022025-03-07T23:31:12.194ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347032025-03-07T23:31:12.195ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347042025-03-07T23:31:12.197ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
347052025-03-07T23:31:12.197ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
347062025-03-07T23:31:12.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347072025-03-07T23:31:12.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347082025-03-07T23:31:12.203ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347092025-03-07T23:31:12.206ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
347102025-03-07T23:31:12.207ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
347112025-03-07T23:31:12.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347122025-03-07T23:31:12.207ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347132025-03-07T23:31:12.209ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347142025-03-07T23:31:12.213ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
347152025-03-07T23:31:12.213ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347162025-03-07T23:31:12.213ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347172025-03-07T23:31:12.213ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347182025-03-07T23:31:12.225ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
347192025-03-07T23:31:12.270ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
347202025-03-07T23:31:12.270ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347212025-03-07T23:31:12.270ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347222025-03-07T23:31:12.272ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347232025-03-07T23:31:12.278ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
347242025-03-07T23:31:12.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
347252025-03-07T23:31:12.281ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
347262025-03-07T23:31:12.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347272025-03-07T23:31:12.281ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347282025-03-07T23:31:12.283ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347292025-03-07T23:31:12.292ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
347302025-03-07T23:31:12.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
347312025-03-07T23:31:12.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
347322025-03-07T23:31:12.293ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
347332025-03-07T23:31:12.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
347342025-03-07T23:31:12.311ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
347352025-03-07T23:31:12.311ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d uri = /v1/images/demo-image?project=demo-project
347362025-03-07T23:31:12.311ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database uri = /v1/images/demo-image?project=demo-project
347372025-03-07T23:31:12.311ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347382025-03-07T23:31:12.312ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
347392025-03-07T23:31:12.316ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database uri = /v1/images/demo-image?project=demo-project
347402025-03-07T23:31:12.316ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347412025-03-07T23:31:12.317ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
347422025-03-07T23:31:12.320ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database uri = /v1/images/demo-image?project=demo-project
347432025-03-07T23:31:12.320ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347442025-03-07T23:31:12.321ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
347452025-03-07T23:31:12.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
347462025-03-07T23:31:12.323ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images/demo-image?project=demo-project
347472025-03-07T23:31:12.323ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database uri = /v1/images/demo-image?project=demo-project
347482025-03-07T23:31:12.324ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347492025-03-07T23:31:12.324ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
347502025-03-07T23:31:12.328ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
347512025-03-07T23:31:12.328ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database uri = /v1/images/demo-image?project=demo-project
347522025-03-07T23:31:12.328ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347532025-03-07T23:31:12.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
347542025-03-07T23:31:12.334ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
347552025-03-07T23:31:12.334ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database uri = /v1/images/demo-image?project=demo-project
347562025-03-07T23:31:12.334ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347572025-03-07T23:31:12.335ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
347582025-03-07T23:31:12.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
347592025-03-07T23:31:12.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } result = Err(ObjectNotFound { type_name: ProjectImage, lookup_type: ByName("demo-image") }) uri = /v1/images/demo-image?project=demo-project
347602025-03-07T23:31:12.358ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project-image with name "demo-image" error_message_internal = not found: project-image with name "demo-image" latency_us = 163599 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a9ddd126-7033-4beb-89df-892e9819846d response_code = 404 uri = /v1/images/demo-image?project=demo-project
347612025-03-07T23:31:12.360ZINFOtest_unauthorized (external client test context): client received response status = 404
347622025-03-07T23:31:12.360ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images/demo-image?project=demo-project
347632025-03-07T23:31:12.361ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
347642025-03-07T23:31:12.363ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3daea8a-aa8c-4a3a-a237-42951da500b9 uri = /v1/images/demo-image?project=demo-project
347652025-03-07T23:31:12.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3daea8a-aa8c-4a3a-a237-42951da500b9 uri = /v1/images/demo-image?project=demo-project
347662025-03-07T23:31:12.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3daea8a-aa8c-4a3a-a237-42951da500b9 uri = /v1/images/demo-image?project=demo-project
347672025-03-07T23:31:12.364ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3daea8a-aa8c-4a3a-a237-42951da500b9 uri = /v1/images/demo-image?project=demo-project
347682025-03-07T23:31:12.364ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 401 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b3daea8a-aa8c-4a3a-a237-42951da500b9 response_code = 401 uri = /v1/images/demo-image?project=demo-project
347692025-03-07T23:31:12.364ZINFOtest_unauthorized (external client test context): client received response status = 401
347702025-03-07T23:31:12.364ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images/demo-image?project=demo-project
347712025-03-07T23:31:12.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
347722025-03-07T23:31:12.364ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cd6e1a6-a49a-4085-a0ca-e83c3fb58cac uri = /v1/images/demo-image?project=demo-project
347732025-03-07T23:31:12.364ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cd6e1a6-a49a-4085-a0ca-e83c3fb58cac uri = /v1/images/demo-image?project=demo-project
347742025-03-07T23:31:12.364ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cd6e1a6-a49a-4085-a0ca-e83c3fb58cac uri = /v1/images/demo-image?project=demo-project
347752025-03-07T23:31:12.364ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 166 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cd6e1a6-a49a-4085-a0ca-e83c3fb58cac response_code = 401 uri = /v1/images/demo-image?project=demo-project
347762025-03-07T23:31:12.365ZINFOtest_unauthorized (external client test context): client received response status = 401
347772025-03-07T23:31:12.365ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images/demo-image?project=demo-project
347782025-03-07T23:31:12.365ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
347792025-03-07T23:31:12.365ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c699f951-07f9-4071-a63a-ccdff1344359 uri = /v1/images/demo-image?project=demo-project
347802025-03-07T23:31:12.365ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c699f951-07f9-4071-a63a-ccdff1344359 uri = /v1/images/demo-image?project=demo-project
347812025-03-07T23:31:12.366ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4379:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4408:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c699f951-07f9-4071-a63a-ccdff1344359 uri = /v1/images/demo-image?project=demo-project
347822025-03-07T23:31:12.366ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1027 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c699f951-07f9-4071-a63a-ccdff1344359 response_code = 401 uri = /v1/images/demo-image?project=demo-project
347832025-03-07T23:31:12.366ZINFOtest_unauthorized (external client test context): client received response status = 401
347842025-03-07T23:31:12.366ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images/demo-image?project=demo-project
347852025-03-07T23:31:12.367ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
347862025-03-07T23:31:12.367ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6c26a14-ea49-4f29-9a37-1512743eaf4e uri = /v1/images/demo-image?project=demo-project
347872025-03-07T23:31:12.367ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6c26a14-ea49-4f29-9a37-1512743eaf4e response_code = 405 uri = /v1/images/demo-image?project=demo-project
347882025-03-07T23:31:12.368ZINFOtest_unauthorized (external client test context): client received response status = 405
347892025-03-07T23:31:12.368ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images/demo-image?project=demo-project
347902025-03-07T23:31:12.368ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
347912025-03-07T23:31:12.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = adf245af-4e32-4a4f-a274-ebc0dafd09f0 uri = /v1/images/demo-image?project=demo-project
347922025-03-07T23:31:12.368ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = adf245af-4e32-4a4f-a274-ebc0dafd09f0 response_code = 405 uri = /v1/images/demo-image?project=demo-project
347932025-03-07T23:31:12.368ZINFOtest_unauthorized (external client test context): client received response status = 405
347942025-03-07T23:31:12.368ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images/demo-image?project=demo-project
347952025-03-07T23:31:12.368ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
347962025-03-07T23:31:12.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3af9b4ca-cbcb-4991-bfe7-ad74a01b29e7 uri = /v1/images/demo-image?project=demo-project
347972025-03-07T23:31:12.368ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3af9b4ca-cbcb-4991-bfe7-ad74a01b29e7 response_code = 405 uri = /v1/images/demo-image?project=demo-project
347982025-03-07T23:31:12.369ZINFOtest_unauthorized (external client test context): client received response status = 405
347992025-03-07T23:31:12.369ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images/demo-image?project=demo-project
348002025-03-07T23:31:12.369ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348012025-03-07T23:31:12.369ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1289f783-be5d-4129-a18f-145c5d67b7c1 uri = /v1/images/demo-image?project=demo-project
348022025-03-07T23:31:12.369ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1289f783-be5d-4129-a18f-145c5d67b7c1 response_code = 405 uri = /v1/images/demo-image?project=demo-project
348032025-03-07T23:31:12.369ZINFOtest_unauthorized (external client test context): client received response status = 405
348042025-03-07T23:31:12.369ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images/demo-image?project=demo-project
348052025-03-07T23:31:12.369ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348062025-03-07T23:31:12.370ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e3ccb113-0533-4b73-af47-c5ad8a4d7f35 uri = /v1/images/demo-image?project=demo-project
348072025-03-07T23:31:12.370ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e3ccb113-0533-4b73-af47-c5ad8a4d7f35 response_code = 405 uri = /v1/images/demo-image?project=demo-project
348082025-03-07T23:31:12.370ZINFOtest_unauthorized (external client test context): client received response status = 405
348092025-03-07T23:31:12.370ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images/demo-image?project=demo-project
348102025-03-07T23:31:12.370ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348112025-03-07T23:31:12.370ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7ec05965-425d-4c59-8f26-f0f724a41986 uri = /v1/images/demo-image?project=demo-project
348122025-03-07T23:31:12.370ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 126 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7ec05965-425d-4c59-8f26-f0f724a41986 response_code = 405 uri = /v1/images/demo-image?project=demo-project
348132025-03-07T23:31:12.371ZINFOtest_unauthorized (external client test context): client received response status = 405
348142025-03-07T23:31:12.371ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images/demo-image?project=demo-project
348152025-03-07T23:31:12.371ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348162025-03-07T23:31:12.371ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8d2b9585-d3bb-4698-a777-29ad43edaaed uri = /v1/images/demo-image?project=demo-project
348172025-03-07T23:31:12.371ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 8d2b9585-d3bb-4698-a777-29ad43edaaed response_code = 405 uri = /v1/images/demo-image?project=demo-project
348182025-03-07T23:31:12.372ZINFOtest_unauthorized (external client test context): client received response status = 405
348192025-03-07T23:31:12.372ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images/demo-image?project=demo-project
348202025-03-07T23:31:12.372ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348212025-03-07T23:31:12.372ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1aaae9fa-cc27-42a1-857b-67552650f6d6 uri = /v1/images/demo-image?project=demo-project
348222025-03-07T23:31:12.372ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 1aaae9fa-cc27-42a1-857b-67552650f6d6 response_code = 405 uri = /v1/images/demo-image?project=demo-project
348232025-03-07T23:31:12.372ZINFOtest_unauthorized (external client test context): client received response status = 405
348242025-03-07T23:31:12.372ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images/demo-image?project=demo-project
348252025-03-07T23:31:12.372ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348262025-03-07T23:31:12.373ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 uri = /v1/images/demo-image?project=demo-project
348272025-03-07T23:31:12.373ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 uri = /v1/images/demo-image?project=demo-project
348282025-03-07T23:31:12.373ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image?project=demo-project
348292025-03-07T23:31:12.373ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348302025-03-07T23:31:12.373ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348312025-03-07T23:31:12.374ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348322025-03-07T23:31:12.376ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348332025-03-07T23:31:12.376ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348342025-03-07T23:31:12.376ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348352025-03-07T23:31:12.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
348362025-03-07T23:31:12.379ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
348372025-03-07T23:31:12.379ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348382025-03-07T23:31:12.379ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348392025-03-07T23:31:12.380ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348402025-03-07T23:31:12.383ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
348412025-03-07T23:31:12.383ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348422025-03-07T23:31:12.383ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348432025-03-07T23:31:12.383ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348442025-03-07T23:31:12.386ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
348452025-03-07T23:31:12.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
348462025-03-07T23:31:12.403ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348472025-03-07T23:31:12.403ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348482025-03-07T23:31:12.404ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348492025-03-07T23:31:12.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
348502025-03-07T23:31:12.407ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
348512025-03-07T23:31:12.407ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348522025-03-07T23:31:12.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348532025-03-07T23:31:12.408ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348542025-03-07T23:31:12.410ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
348552025-03-07T23:31:12.410ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
348562025-03-07T23:31:12.410ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
348572025-03-07T23:31:12.411ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
348582025-03-07T23:31:12.414ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
348592025-03-07T23:31:12.418ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
348602025-03-07T23:31:12.419ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 uri = /v1/images/demo-image?project=demo-project
348612025-03-07T23:31:12.419ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database uri = /v1/images/demo-image?project=demo-project
348622025-03-07T23:31:12.419ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348632025-03-07T23:31:12.419ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
348642025-03-07T23:31:12.422ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database uri = /v1/images/demo-image?project=demo-project
348652025-03-07T23:31:12.422ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348662025-03-07T23:31:12.423ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
348672025-03-07T23:31:12.429ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database uri = /v1/images/demo-image?project=demo-project
348682025-03-07T23:31:12.429ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348692025-03-07T23:31:12.429ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
348702025-03-07T23:31:12.435ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
348712025-03-07T23:31:12.435ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images/demo-image?project=demo-project
348722025-03-07T23:31:12.435ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database uri = /v1/images/demo-image?project=demo-project
348732025-03-07T23:31:12.435ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348742025-03-07T23:31:12.436ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
348752025-03-07T23:31:12.439ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
348762025-03-07T23:31:12.439ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database uri = /v1/images/demo-image?project=demo-project
348772025-03-07T23:31:12.439ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348782025-03-07T23:31:12.440ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
348792025-03-07T23:31:12.449ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
348802025-03-07T23:31:12.449ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database uri = /v1/images/demo-image?project=demo-project
348812025-03-07T23:31:12.449ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348822025-03-07T23:31:12.450ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
348832025-03-07T23:31:12.454ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
348842025-03-07T23:31:12.486ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } result = Err(ObjectNotFound { type_name: ProjectImage, lookup_type: ByName("demo-image") }) uri = /v1/images/demo-image?project=demo-project
348852025-03-07T23:31:12.486ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project-image with name "demo-image" error_message_internal = not found: project-image with name "demo-image" latency_us = 113593 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = fe8b7def-d8ca-4e7f-8202-4cec3680b359 response_code = 404 uri = /v1/images/demo-image?project=demo-project
348862025-03-07T23:31:12.487ZINFOtest_unauthorized (external client test context): client received response status = 404
348872025-03-07T23:31:12.487ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images/demo-image?project=demo-project
348882025-03-07T23:31:12.487ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348892025-03-07T23:31:12.488ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4db7516-9b91-4900-b985-2c10138afe4f uri = /v1/images/demo-image?project=demo-project
348902025-03-07T23:31:12.488ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4db7516-9b91-4900-b985-2c10138afe4f uri = /v1/images/demo-image?project=demo-project
348912025-03-07T23:31:12.488ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4db7516-9b91-4900-b985-2c10138afe4f uri = /v1/images/demo-image?project=demo-project
348922025-03-07T23:31:12.488ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4db7516-9b91-4900-b985-2c10138afe4f uri = /v1/images/demo-image?project=demo-project
348932025-03-07T23:31:12.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 382 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = b4db7516-9b91-4900-b985-2c10138afe4f response_code = 401 uri = /v1/images/demo-image?project=demo-project
348942025-03-07T23:31:12.489ZDEBGtest_unauthorized (MgsClient): client request background_task = bfd_manager body = None method = GET uri = http://[::1]:12225/local/switch-id
348952025-03-07T23:31:12.491ZDEBGtest_unauthorized (MgsClient): client request background_task = switch_port_config_manager body = None method = GET rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc uri = http://[::1]:12225/local/switch-id
348962025-03-07T23:31:12.491ZINFOtest_unauthorized (external client test context): client received response status = 401
348972025-03-07T23:31:12.491ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images/demo-image?project=demo-project
348982025-03-07T23:31:12.491ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
348992025-03-07T23:31:12.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f3129620-3012-4549-b247-942d6afda181 uri = /v1/images/demo-image?project=demo-project
349002025-03-07T23:31:12.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f3129620-3012-4549-b247-942d6afda181 uri = /v1/images/demo-image?project=demo-project
349012025-03-07T23:31:12.492ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f3129620-3012-4549-b247-942d6afda181 uri = /v1/images/demo-image?project=demo-project
349022025-03-07T23:31:12.492ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 336 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f3129620-3012-4549-b247-942d6afda181 response_code = 401 uri = /v1/images/demo-image?project=demo-project
349032025-03-07T23:31:12.493ZINFOtest_unauthorized (external client test context): client received response status = 401
349042025-03-07T23:31:12.494ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images/demo-image?project=demo-project
349052025-03-07T23:31:12.494ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
349062025-03-07T23:31:12.494ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8e8525e3-7066-4e78-8e7a-d7b8cd90d61b uri = /v1/images/demo-image?project=demo-project
349072025-03-07T23:31:12.494ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8e8525e3-7066-4e78-8e7a-d7b8cd90d61b uri = /v1/images/demo-image?project=demo-project
349082025-03-07T23:31:12.494ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4419:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4439:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8e8525e3-7066-4e78-8e7a-d7b8cd90d61b uri = /v1/images/demo-image?project=demo-project
349092025-03-07T23:31:12.494ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1320 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8e8525e3-7066-4e78-8e7a-d7b8cd90d61b response_code = 401 uri = /v1/images/demo-image?project=demo-project
349102025-03-07T23:31:12.495ZINFOtest_unauthorized (external client test context): client received response status = 401
349112025-03-07T23:31:12.495ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images/demo-image?project=demo-project
349122025-03-07T23:31:12.495ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
349132025-03-07T23:31:12.495ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fb9e72d4-b61d-4d8c-adbd-34c7f571b9b8 uri = /v1/images/demo-image?project=demo-project
349142025-03-07T23:31:12.495ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 77 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = fb9e72d4-b61d-4d8c-adbd-34c7f571b9b8 response_code = 405 uri = /v1/images/demo-image?project=demo-project
349152025-03-07T23:31:12.505ZINFOtest_unauthorized (external client test context): client received response status = 405
349162025-03-07T23:31:12.505ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images/demo-image?project=demo-project
349172025-03-07T23:31:12.505ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
349182025-03-07T23:31:12.506ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 58e6762b-29ed-456a-9612-a44dad37dad4 uri = /v1/images/demo-image?project=demo-project
349192025-03-07T23:31:12.506ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 88 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 58e6762b-29ed-456a-9612-a44dad37dad4 response_code = 405 uri = /v1/images/demo-image?project=demo-project
349202025-03-07T23:31:12.506ZINFOtest_unauthorized (external client test context): client received response status = 405
349212025-03-07T23:31:12.506ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images/demo-image?project=demo-project
349222025-03-07T23:31:12.506ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
349232025-03-07T23:31:12.506ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6c6606f8-0fe3-4491-8375-c23be2299d8a uri = /v1/images/demo-image?project=demo-project
349242025-03-07T23:31:12.506ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6c6606f8-0fe3-4491-8375-c23be2299d8a response_code = 405 uri = /v1/images/demo-image?project=demo-project
349252025-03-07T23:31:12.507ZINFOtest_unauthorized (external client test context): client received response status = 405
349262025-03-07T23:31:12.507ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images/demo-image?project=demo-project
349272025-03-07T23:31:12.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
349282025-03-07T23:31:12.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bb5ef315-dd0b-4af1-a8d0-d1a8a00499b9 uri = /v1/images/demo-image?project=demo-project
349292025-03-07T23:31:12.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = bb5ef315-dd0b-4af1-a8d0-d1a8a00499b9 response_code = 405 uri = /v1/images/demo-image?project=demo-project
349302025-03-07T23:31:12.507ZINFOtest_unauthorized (external client test context): client received response status = 405
349312025-03-07T23:31:12.507ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images/demo-image?project=demo-project
349322025-03-07T23:31:12.507ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image?project=demo-project
349332025-03-07T23:31:12.507ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d uri = /v1/images/demo-image?project=demo-project
349342025-03-07T23:31:12.507ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d uri = /v1/images/demo-image?project=demo-project
349352025-03-07T23:31:12.507ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/images/demo-image?project=demo-project
349362025-03-07T23:31:12.507ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349372025-03-07T23:31:12.507ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349382025-03-07T23:31:12.508ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349392025-03-07T23:31:12.513ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349402025-03-07T23:31:12.513ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349412025-03-07T23:31:12.513ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349422025-03-07T23:31:12.517ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
349432025-03-07T23:31:12.518ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
349442025-03-07T23:31:12.518ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349452025-03-07T23:31:12.518ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349462025-03-07T23:31:12.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349472025-03-07T23:31:12.529ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
349482025-03-07T23:31:12.529ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349492025-03-07T23:31:12.529ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349502025-03-07T23:31:12.533ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349512025-03-07T23:31:12.535ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
349522025-03-07T23:31:12.540ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
349532025-03-07T23:31:12.540ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349542025-03-07T23:31:12.540ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349552025-03-07T23:31:12.541ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349562025-03-07T23:31:12.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
349572025-03-07T23:31:12.545ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
349582025-03-07T23:31:12.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349592025-03-07T23:31:12.545ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349602025-03-07T23:31:12.546ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349612025-03-07T23:31:12.548ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
349622025-03-07T23:31:12.549ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
349632025-03-07T23:31:12.549ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
349642025-03-07T23:31:12.549ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
349652025-03-07T23:31:12.552ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
349662025-03-07T23:31:12.557ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
349672025-03-07T23:31:12.557ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d uri = /v1/images/demo-image?project=demo-project
349682025-03-07T23:31:12.558ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database uri = /v1/images/demo-image?project=demo-project
349692025-03-07T23:31:12.558ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
349702025-03-07T23:31:12.558ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349712025-03-07T23:31:12.563ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
349722025-03-07T23:31:12.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
349732025-03-07T23:31:12.563ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database uri = /v1/images/demo-image?project=demo-project
349742025-03-07T23:31:12.563ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
349752025-03-07T23:31:12.564ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349762025-03-07T23:31:12.566ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database uri = /v1/images/demo-image?project=demo-project
349772025-03-07T23:31:12.566ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
349782025-03-07T23:31:12.567ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349792025-03-07T23:31:12.568ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
349802025-03-07T23:31:12.569ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
349812025-03-07T23:31:12.569ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
349822025-03-07T23:31:12.569ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
349832025-03-07T23:31:12.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image?project=demo-project
349842025-03-07T23:31:12.570ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images/demo-image?project=demo-project
349852025-03-07T23:31:12.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database uri = /v1/images/demo-image?project=demo-project
349862025-03-07T23:31:12.570ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
349872025-03-07T23:31:12.573ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349882025-03-07T23:31:12.579ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image?project=demo-project
349892025-03-07T23:31:12.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database uri = /v1/images/demo-image?project=demo-project
349902025-03-07T23:31:12.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
349912025-03-07T23:31:12.580ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349922025-03-07T23:31:12.584ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image?project=demo-project
349932025-03-07T23:31:12.586ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database uri = /v1/images/demo-image?project=demo-project
349942025-03-07T23:31:12.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {} } uri = /v1/images/demo-image?project=demo-project
349952025-03-07T23:31:12.601ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = Database result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349962025-03-07T23:31:12.612ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/images/demo-image?project=demo-project
349972025-03-07T23:31:12.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } result = Ok(()) uri = /v1/images/demo-image?project=demo-project
349982025-03-07T23:31:12.642ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 134994 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f22b4395-4bc0-4220-bc4c-222cc3f7d62d response_code = 200 uri = /v1/images/demo-image?project=demo-project
349992025-03-07T23:31:12.643ZINFOtest_unauthorized (external client test context): client received response status = 200
350002025-03-07T23:31:12.643ZINFOtest_unauthorized: test: begin endpoint url = /v1/images/demo-image/promote?project=demo-project
350012025-03-07T23:31:12.643ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/images/demo-image/promote?project=demo-project
350022025-03-07T23:31:12.643ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images/demo-image/promote?project=demo-project
350032025-03-07T23:31:12.643ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350042025-03-07T23:31:12.643ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6454a9a3-b563-4dfe-941b-1fedd90f539a uri = /v1/images/demo-image/promote?project=demo-project
350052025-03-07T23:31:12.644ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 301 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6454a9a3-b563-4dfe-941b-1fedd90f539a response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350062025-03-07T23:31:12.644ZINFOtest_unauthorized (external client test context): client received response status = 405
350072025-03-07T23:31:12.657ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images/demo-image/promote?project=demo-project
350082025-03-07T23:31:12.657ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350092025-03-07T23:31:12.657ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 739e5476-6cf2-495a-ba3b-124e654ed15c uri = /v1/images/demo-image/promote?project=demo-project
350102025-03-07T23:31:12.657ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 210 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 739e5476-6cf2-495a-ba3b-124e654ed15c response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350112025-03-07T23:31:12.657ZINFOtest_unauthorized (external client test context): client received response status = 405
350122025-03-07T23:31:12.657ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images/demo-image/promote?project=demo-project
350132025-03-07T23:31:12.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350142025-03-07T23:31:12.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = facacd4f-16ee-4c30-a2db-463ae28b1321 uri = /v1/images/demo-image/promote?project=demo-project
350152025-03-07T23:31:12.658ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = facacd4f-16ee-4c30-a2db-463ae28b1321 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350162025-03-07T23:31:12.658ZINFOtest_unauthorized (external client test context): client received response status = 405
350172025-03-07T23:31:12.658ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images/demo-image/promote?project=demo-project
350182025-03-07T23:31:12.658ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350192025-03-07T23:31:12.658ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 563e6030-49b4-4d5b-94b1-14514286eae2 uri = /v1/images/demo-image/promote?project=demo-project
350202025-03-07T23:31:12.658ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 563e6030-49b4-4d5b-94b1-14514286eae2 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350212025-03-07T23:31:12.659ZINFOtest_unauthorized (external client test context): client received response status = 405
350222025-03-07T23:31:12.659ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images/demo-image/promote?project=demo-project
350232025-03-07T23:31:12.659ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350242025-03-07T23:31:12.659ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4a232582-6534-410a-887d-e58501e660e7 uri = /v1/images/demo-image/promote?project=demo-project
350252025-03-07T23:31:12.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 4a232582-6534-410a-887d-e58501e660e7 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350262025-03-07T23:31:12.659ZINFOtest_unauthorized (external client test context): client received response status = 405
350272025-03-07T23:31:12.659ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images/demo-image/promote?project=demo-project
350282025-03-07T23:31:12.659ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350292025-03-07T23:31:12.659ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d2d63223-cfee-4948-8f74-adf25572efbc uri = /v1/images/demo-image/promote?project=demo-project
350302025-03-07T23:31:12.659ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d2d63223-cfee-4948-8f74-adf25572efbc response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350312025-03-07T23:31:12.660ZINFOtest_unauthorized (external client test context): client received response status = 405
350322025-03-07T23:31:12.660ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images/demo-image/promote?project=demo-project
350332025-03-07T23:31:12.660ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350342025-03-07T23:31:12.661ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3732216-013d-473b-bc90-67a81ddd1211 uri = /v1/images/demo-image/promote?project=demo-project
350352025-03-07T23:31:12.661ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a3732216-013d-473b-bc90-67a81ddd1211 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350362025-03-07T23:31:12.661ZINFOtest_unauthorized (external client test context): client received response status = 405
350372025-03-07T23:31:12.661ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images/demo-image/promote?project=demo-project
350382025-03-07T23:31:12.661ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350392025-03-07T23:31:12.661ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 947a989c-7b95-4c34-9b95-5c7964915874 uri = /v1/images/demo-image/promote?project=demo-project
350402025-03-07T23:31:12.661ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 89 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 947a989c-7b95-4c34-9b95-5c7964915874 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
350412025-03-07T23:31:12.662ZINFOtest_unauthorized (external client test context): client received response status = 405
350422025-03-07T23:31:12.662ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images/demo-image/promote?project=demo-project
350432025-03-07T23:31:12.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
350442025-03-07T23:31:12.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 uri = /v1/images/demo-image/promote?project=demo-project
350452025-03-07T23:31:12.662ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 uri = /v1/images/demo-image/promote?project=demo-project
350462025-03-07T23:31:12.662ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image/promote?project=demo-project
350472025-03-07T23:31:12.662ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350482025-03-07T23:31:12.662ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350492025-03-07T23:31:12.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350502025-03-07T23:31:12.672ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350512025-03-07T23:31:12.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350522025-03-07T23:31:12.674ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350532025-03-07T23:31:12.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
350542025-03-07T23:31:12.679ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
350552025-03-07T23:31:12.679ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350562025-03-07T23:31:12.679ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350572025-03-07T23:31:12.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350582025-03-07T23:31:12.684ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
350592025-03-07T23:31:12.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350602025-03-07T23:31:12.684ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350612025-03-07T23:31:12.685ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350622025-03-07T23:31:12.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
350632025-03-07T23:31:12.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
350642025-03-07T23:31:12.697ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350652025-03-07T23:31:12.697ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350662025-03-07T23:31:12.697ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350672025-03-07T23:31:12.701ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
350682025-03-07T23:31:12.701ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
350692025-03-07T23:31:12.701ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350702025-03-07T23:31:12.701ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350712025-03-07T23:31:12.702ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350722025-03-07T23:31:12.709ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
350732025-03-07T23:31:12.709ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
350742025-03-07T23:31:12.709ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
350752025-03-07T23:31:12.710ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
350762025-03-07T23:31:12.712ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
350772025-03-07T23:31:12.717ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
350782025-03-07T23:31:12.717ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 uri = /v1/images/demo-image/promote?project=demo-project
350792025-03-07T23:31:12.717ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
350802025-03-07T23:31:12.717ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
350812025-03-07T23:31:12.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
350822025-03-07T23:31:12.721ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
350832025-03-07T23:31:12.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
350842025-03-07T23:31:12.722ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
350852025-03-07T23:31:12.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
350862025-03-07T23:31:12.725ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
350872025-03-07T23:31:12.725ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
350882025-03-07T23:31:12.728ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } uri = /v1/images/demo-image/promote?project=demo-project
350892025-03-07T23:31:12.728ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/images/demo-image/promote?project=demo-project
350902025-03-07T23:31:12.728ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
350912025-03-07T23:31:12.728ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
350922025-03-07T23:31:12.728ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
350932025-03-07T23:31:12.733ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/images/demo-image/promote?project=demo-project
350942025-03-07T23:31:12.733ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
350952025-03-07T23:31:12.733ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
350962025-03-07T23:31:12.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
350972025-03-07T23:31:12.751ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/images/demo-image/promote?project=demo-project
350982025-03-07T23:31:12.751ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database uri = /v1/images/demo-image/promote?project=demo-project
350992025-03-07T23:31:12.751ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
351002025-03-07T23:31:12.753ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = Database result = Ok(()) uri = /v1/images/demo-image/promote?project=demo-project
351012025-03-07T23:31:12.761ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/promote?project=demo-project
351022025-03-07T23:31:12.784ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 resource = ProjectImage { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 9f0ee8ed-3697-49e4-8149-ff1b38d211b7, lookup_type: ByName("demo-image") } result = Err(ObjectNotFound { type_name: ProjectImage, lookup_type: ByName("demo-image") }) uri = /v1/images/demo-image/promote?project=demo-project
351032025-03-07T23:31:12.785ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project-image with name "demo-image" error_message_internal = not found: project-image with name "demo-image" latency_us = 122778 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 697e7078-d9f4-4b02-9025-251d3342b069 response_code = 404 uri = /v1/images/demo-image/promote?project=demo-project
351042025-03-07T23:31:12.789ZINFOtest_unauthorized (external client test context): client received response status = 404
351052025-03-07T23:31:12.789ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images/demo-image/promote?project=demo-project
351062025-03-07T23:31:12.789ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351072025-03-07T23:31:12.793ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5594ec2a-5fc7-4870-908d-ad3a086c5929 uri = /v1/images/demo-image/promote?project=demo-project
351082025-03-07T23:31:12.793ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5594ec2a-5fc7-4870-908d-ad3a086c5929 uri = /v1/images/demo-image/promote?project=demo-project
351092025-03-07T23:31:12.793ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5594ec2a-5fc7-4870-908d-ad3a086c5929 uri = /v1/images/demo-image/promote?project=demo-project
351102025-03-07T23:31:12.793ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5594ec2a-5fc7-4870-908d-ad3a086c5929 uri = /v1/images/demo-image/promote?project=demo-project
351112025-03-07T23:31:12.793ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 482 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5594ec2a-5fc7-4870-908d-ad3a086c5929 response_code = 401 uri = /v1/images/demo-image/promote?project=demo-project
351122025-03-07T23:31:12.800ZINFOtest_unauthorized (external client test context): client received response status = 401
351132025-03-07T23:31:12.801ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images/demo-image/promote?project=demo-project
351142025-03-07T23:31:12.801ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351152025-03-07T23:31:12.803ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b119f0b0-78ef-47a0-8cc1-66a2632f13a9 uri = /v1/images/demo-image/promote?project=demo-project
351162025-03-07T23:31:12.807ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b119f0b0-78ef-47a0-8cc1-66a2632f13a9 uri = /v1/images/demo-image/promote?project=demo-project
351172025-03-07T23:31:12.807ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b119f0b0-78ef-47a0-8cc1-66a2632f13a9 uri = /v1/images/demo-image/promote?project=demo-project
351182025-03-07T23:31:12.807ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 4464 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b119f0b0-78ef-47a0-8cc1-66a2632f13a9 response_code = 401 uri = /v1/images/demo-image/promote?project=demo-project
351192025-03-07T23:31:12.809ZINFOtest_unauthorized (external client test context): client received response status = 401
351202025-03-07T23:31:12.809ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images/demo-image/promote?project=demo-project
351212025-03-07T23:31:12.809ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351222025-03-07T23:31:12.812ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33a8b2d5-8982-4d9e-bad2-492d67e711c3 uri = /v1/images/demo-image/promote?project=demo-project
351232025-03-07T23:31:12.812ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33a8b2d5-8982-4d9e-bad2-492d67e711c3 uri = /v1/images/demo-image/promote?project=demo-project
351242025-03-07T23:31:12.814ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4450:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4470:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_promote::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33a8b2d5-8982-4d9e-bad2-492d67e711c3 uri = /v1/images/demo-image/promote?project=demo-project
351252025-03-07T23:31:12.814ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1658 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33a8b2d5-8982-4d9e-bad2-492d67e711c3 response_code = 401 uri = /v1/images/demo-image/promote?project=demo-project
351262025-03-07T23:31:12.816ZINFOtest_unauthorized (external client test context): client received response status = 401
351272025-03-07T23:31:12.816ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images/demo-image/promote?project=demo-project
351282025-03-07T23:31:12.816ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351292025-03-07T23:31:12.817ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = da00f924-33a8-4bbf-a41e-1a2563b5c2b7 uri = /v1/images/demo-image/promote?project=demo-project
351302025-03-07T23:31:12.817ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 378 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = da00f924-33a8-4bbf-a41e-1a2563b5c2b7 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351312025-03-07T23:31:12.823ZINFOtest_unauthorized (external client test context): client received response status = 405
351322025-03-07T23:31:12.823ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images/demo-image/promote?project=demo-project
351332025-03-07T23:31:12.823ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351342025-03-07T23:31:12.824ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9e6fd34f-368e-42a1-bb98-9d9b17087865 uri = /v1/images/demo-image/promote?project=demo-project
351352025-03-07T23:31:12.824ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 154 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9e6fd34f-368e-42a1-bb98-9d9b17087865 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351362025-03-07T23:31:12.824ZINFOtest_unauthorized (external client test context): client received response status = 405
351372025-03-07T23:31:12.824ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images/demo-image/promote?project=demo-project
351382025-03-07T23:31:12.824ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351392025-03-07T23:31:12.825ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7f11fe5b-0b76-4219-9b29-d7668b1cdc46 uri = /v1/images/demo-image/promote?project=demo-project
351402025-03-07T23:31:12.825ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 377 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 7f11fe5b-0b76-4219-9b29-d7668b1cdc46 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351412025-03-07T23:31:12.825ZINFOtest_unauthorized (external client test context): client received response status = 405
351422025-03-07T23:31:12.826ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images/demo-image/promote?project=demo-project
351432025-03-07T23:31:12.826ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351442025-03-07T23:31:12.827ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f558f513-2d2f-4ffa-807f-bdd592190c6f uri = /v1/images/demo-image/promote?project=demo-project
351452025-03-07T23:31:12.827ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 153 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f558f513-2d2f-4ffa-807f-bdd592190c6f response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351462025-03-07T23:31:12.827ZINFOtest_unauthorized (external client test context): client received response status = 405
351472025-03-07T23:31:12.827ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images/demo-image/promote?project=demo-project
351482025-03-07T23:31:12.827ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351492025-03-07T23:31:12.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2a16ba0c-0608-4bae-8130-6f519607cb16 uri = /v1/images/demo-image/promote?project=demo-project
351502025-03-07T23:31:12.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 140 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2a16ba0c-0608-4bae-8130-6f519607cb16 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351512025-03-07T23:31:12.828ZINFOtest_unauthorized (external client test context): client received response status = 405
351522025-03-07T23:31:12.828ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images/demo-image/promote?project=demo-project
351532025-03-07T23:31:12.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351542025-03-07T23:31:12.829ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 72f855fa-183c-40e4-9afb-5f3d605bb5c1 uri = /v1/images/demo-image/promote?project=demo-project
351552025-03-07T23:31:12.829ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 151 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 72f855fa-183c-40e4-9afb-5f3d605bb5c1 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351562025-03-07T23:31:12.829ZINFOtest_unauthorized (external client test context): client received response status = 405
351572025-03-07T23:31:12.830ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images/demo-image/promote?project=demo-project
351582025-03-07T23:31:12.830ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351592025-03-07T23:31:12.830ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a3d4be28-6a2b-4cd9-bb33-5b28f3060ee3 uri = /v1/images/demo-image/promote?project=demo-project
351602025-03-07T23:31:12.831ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 156 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a3d4be28-6a2b-4cd9-bb33-5b28f3060ee3 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351612025-03-07T23:31:12.831ZINFOtest_unauthorized (external client test context): client received response status = 405
351622025-03-07T23:31:12.831ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images/demo-image/promote?project=demo-project
351632025-03-07T23:31:12.831ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/promote?project=demo-project
351642025-03-07T23:31:12.832ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c1747250-e916-4c97-8223-794727e51fc8 uri = /v1/images/demo-image/promote?project=demo-project
351652025-03-07T23:31:12.832ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 317 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = c1747250-e916-4c97-8223-794727e51fc8 response_code = 405 uri = /v1/images/demo-image/promote?project=demo-project
351662025-03-07T23:31:12.832ZINFOtest_unauthorized (external client test context): client received response status = 405
351672025-03-07T23:31:12.832ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images/demo-image/promote?project=demo-project
351682025-03-07T23:31:12.833ZINFOtest_unauthorized: test: begin endpoint url = /v1/images/demo-image/demote?project=demo-project
351692025-03-07T23:31:12.833ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/images/demo-image/demote?project=demo-project
351702025-03-07T23:31:12.833ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/images/demo-image/demote?project=demo-project
351712025-03-07T23:31:12.833ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
351722025-03-07T23:31:12.834ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45e2d0db-26fb-4833-bf9d-8a39cb267576 uri = /v1/images/demo-image/demote?project=demo-project
351732025-03-07T23:31:12.834ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 154 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 45e2d0db-26fb-4833-bf9d-8a39cb267576 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
351742025-03-07T23:31:12.834ZINFOtest_unauthorized (external client test context): client received response status = 405
351752025-03-07T23:31:12.834ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/images/demo-image/demote?project=demo-project
351762025-03-07T23:31:12.834ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
351772025-03-07T23:31:12.835ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 78607e88-3474-41b5-a5f7-e0839b48a266 uri = /v1/images/demo-image/demote?project=demo-project
351782025-03-07T23:31:12.835ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 148 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 78607e88-3474-41b5-a5f7-e0839b48a266 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
351792025-03-07T23:31:12.835ZINFOtest_unauthorized (external client test context): client received response status = 405
351802025-03-07T23:31:12.836ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/images/demo-image/demote?project=demo-project
351812025-03-07T23:31:12.836ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
351822025-03-07T23:31:12.836ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 378826e8-afe9-4c89-bb10-5af4ca56b476 uri = /v1/images/demo-image/demote?project=demo-project
351832025-03-07T23:31:12.836ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 157 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 378826e8-afe9-4c89-bb10-5af4ca56b476 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
351842025-03-07T23:31:12.837ZINFOtest_unauthorized (external client test context): client received response status = 405
351852025-03-07T23:31:12.837ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/images/demo-image/demote?project=demo-project
351862025-03-07T23:31:12.837ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
351872025-03-07T23:31:12.837ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbb04bfb-52df-446d-8ccb-8685b46355a8 uri = /v1/images/demo-image/demote?project=demo-project
351882025-03-07T23:31:12.837ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bbb04bfb-52df-446d-8ccb-8685b46355a8 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
351892025-03-07T23:31:12.838ZINFOtest_unauthorized (external client test context): client received response status = 405
351902025-03-07T23:31:12.838ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/images/demo-image/demote?project=demo-project
351912025-03-07T23:31:12.838ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
351922025-03-07T23:31:12.838ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e81a2a4a-0886-48a8-ba44-db5c872a216f uri = /v1/images/demo-image/demote?project=demo-project
351932025-03-07T23:31:12.838ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 157 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e81a2a4a-0886-48a8-ba44-db5c872a216f response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
351942025-03-07T23:31:12.839ZINFOtest_unauthorized (external client test context): client received response status = 405
351952025-03-07T23:31:12.839ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/images/demo-image/demote?project=demo-project
351962025-03-07T23:31:12.839ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
351972025-03-07T23:31:12.839ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9f67dd6e-bdf6-40ac-afdd-8401bc5ceb4e uri = /v1/images/demo-image/demote?project=demo-project
351982025-03-07T23:31:12.839ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 189 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9f67dd6e-bdf6-40ac-afdd-8401bc5ceb4e response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
351992025-03-07T23:31:12.840ZINFOtest_unauthorized (external client test context): client received response status = 405
352002025-03-07T23:31:12.840ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/images/demo-image/demote?project=demo-project
352012025-03-07T23:31:12.840ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352022025-03-07T23:31:12.840ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 774786d8-7d49-4f38-8556-c9f6122d2bd7 uri = /v1/images/demo-image/demote?project=demo-project
352032025-03-07T23:31:12.840ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 149 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 774786d8-7d49-4f38-8556-c9f6122d2bd7 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
352042025-03-07T23:31:12.841ZINFOtest_unauthorized (external client test context): client received response status = 405
352052025-03-07T23:31:12.841ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/images/demo-image/demote?project=demo-project
352062025-03-07T23:31:12.841ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352072025-03-07T23:31:12.841ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 346e0f56-4224-4cfb-916a-db2543378411 uri = /v1/images/demo-image/demote?project=demo-project
352082025-03-07T23:31:12.842ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 346e0f56-4224-4cfb-916a-db2543378411 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
352092025-03-07T23:31:12.842ZINFOtest_unauthorized (external client test context): client received response status = 405
352102025-03-07T23:31:12.842ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/images/demo-image/demote?project=demo-project
352112025-03-07T23:31:12.844ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352122025-03-07T23:31:12.844ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 uri = /v1/images/demo-image/demote?project=demo-project
352132025-03-07T23:31:12.844ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 uri = /v1/images/demo-image/demote?project=demo-project
352142025-03-07T23:31:12.845ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/images/demo-image/demote?project=demo-project
352152025-03-07T23:31:12.845ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352162025-03-07T23:31:12.845ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352172025-03-07T23:31:12.846ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352182025-03-07T23:31:12.860ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352192025-03-07T23:31:12.860ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352202025-03-07T23:31:12.861ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352212025-03-07T23:31:12.913ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
352222025-03-07T23:31:12.913ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
352232025-03-07T23:31:12.913ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352242025-03-07T23:31:12.913ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352252025-03-07T23:31:12.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352262025-03-07T23:31:12.918ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
352272025-03-07T23:31:12.919ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352282025-03-07T23:31:12.919ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352292025-03-07T23:31:12.920ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352302025-03-07T23:31:12.928ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
352312025-03-07T23:31:12.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
352322025-03-07T23:31:12.932ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352332025-03-07T23:31:12.932ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352342025-03-07T23:31:12.933ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352352025-03-07T23:31:12.937ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
352362025-03-07T23:31:12.937ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
352372025-03-07T23:31:12.938ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352382025-03-07T23:31:12.938ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352392025-03-07T23:31:12.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352402025-03-07T23:31:12.941ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
352412025-03-07T23:31:12.941ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
352422025-03-07T23:31:12.941ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
352432025-03-07T23:31:12.942ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
352442025-03-07T23:31:12.946ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
352452025-03-07T23:31:12.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
352462025-03-07T23:31:12.951ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 uri = /v1/images/demo-image/demote?project=demo-project
352472025-03-07T23:31:12.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 resource = Database uri = /v1/images/demo-image/demote?project=demo-project
352482025-03-07T23:31:12.951ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/demote?project=demo-project
352492025-03-07T23:31:12.953ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 resource = Database result = Ok(()) uri = /v1/images/demo-image/demote?project=demo-project
352502025-03-07T23:31:12.961ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 resource = Database uri = /v1/images/demo-image/demote?project=demo-project
352512025-03-07T23:31:12.961ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 roles = RoleSet { roles: {} } uri = /v1/images/demo-image/demote?project=demo-project
352522025-03-07T23:31:12.962ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 resource = Database result = Ok(()) uri = /v1/images/demo-image/demote?project=demo-project
352532025-03-07T23:31:12.971ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: silo-image with name "demo-image" error_message_internal = not found: silo-image with name "demo-image" latency_us = 126798 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e165abba-ece4-4de4-b5c2-c214f3cba869 response_code = 404 uri = /v1/images/demo-image/demote?project=demo-project
352542025-03-07T23:31:12.972ZINFOtest_unauthorized (external client test context): client received response status = 404
352552025-03-07T23:31:12.972ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/images/demo-image/demote?project=demo-project
352562025-03-07T23:31:12.972ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352572025-03-07T23:31:12.972ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58b5e71d-686c-48bd-832d-64cdd40bc8ba uri = /v1/images/demo-image/demote?project=demo-project
352582025-03-07T23:31:12.972ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58b5e71d-686c-48bd-832d-64cdd40bc8ba uri = /v1/images/demo-image/demote?project=demo-project
352592025-03-07T23:31:12.972ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58b5e71d-686c-48bd-832d-64cdd40bc8ba uri = /v1/images/demo-image/demote?project=demo-project
352602025-03-07T23:31:12.972ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58b5e71d-686c-48bd-832d-64cdd40bc8ba uri = /v1/images/demo-image/demote?project=demo-project
352612025-03-07T23:31:12.972ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up current silo: Actor required latency_us = 318 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 58b5e71d-686c-48bd-832d-64cdd40bc8ba response_code = 401 uri = /v1/images/demo-image/demote?project=demo-project
352622025-03-07T23:31:12.973ZINFOtest_unauthorized (external client test context): client received response status = 401
352632025-03-07T23:31:12.973ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/images/demo-image/demote?project=demo-project
352642025-03-07T23:31:12.973ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352652025-03-07T23:31:12.973ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d9b6447-84c6-4ed2-9753-1801cbb3ce56 uri = /v1/images/demo-image/demote?project=demo-project
352662025-03-07T23:31:12.973ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d9b6447-84c6-4ed2-9753-1801cbb3ce56 uri = /v1/images/demo-image/demote?project=demo-project
352672025-03-07T23:31:12.973ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d9b6447-84c6-4ed2-9753-1801cbb3ce56 uri = /v1/images/demo-image/demote?project=demo-project
352682025-03-07T23:31:12.973ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 205 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 7d9b6447-84c6-4ed2-9753-1801cbb3ce56 response_code = 401 uri = /v1/images/demo-image/demote?project=demo-project
352692025-03-07T23:31:12.973ZINFOtest_unauthorized (external client test context): client received response status = 401
352702025-03-07T23:31:12.973ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/images/demo-image/demote?project=demo-project
352712025-03-07T23:31:12.973ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352722025-03-07T23:31:12.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93da911a-830b-489d-97a6-79b70cb090ab uri = /v1/images/demo-image/demote?project=demo-project
352732025-03-07T23:31:12.974ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93da911a-830b-489d-97a6-79b70cb090ab uri = /v1/images/demo-image/demote?project=demo-project
352742025-03-07T23:31:12.975ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4481:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4503:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::image_demote::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::ImagePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>), dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::Image>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93da911a-830b-489d-97a6-79b70cb090ab uri = /v1/images/demo-image/demote?project=demo-project
352752025-03-07T23:31:12.975ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1432 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 93da911a-830b-489d-97a6-79b70cb090ab response_code = 401 uri = /v1/images/demo-image/demote?project=demo-project
352762025-03-07T23:31:12.975ZINFOtest_unauthorized (external client test context): client received response status = 401
352772025-03-07T23:31:12.976ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/images/demo-image/demote?project=demo-project
352782025-03-07T23:31:12.976ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352792025-03-07T23:31:12.977ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cf80c158-6740-47df-a157-36a192ae0067 uri = /v1/images/demo-image/demote?project=demo-project
352802025-03-07T23:31:12.977ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 68 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cf80c158-6740-47df-a157-36a192ae0067 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
352812025-03-07T23:31:12.977ZINFOtest_unauthorized (external client test context): client received response status = 405
352822025-03-07T23:31:12.977ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/images/demo-image/demote?project=demo-project
352832025-03-07T23:31:12.977ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352842025-03-07T23:31:12.977ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f490b6e9-7a1d-4c87-95fc-edcea943e521 uri = /v1/images/demo-image/demote?project=demo-project
352852025-03-07T23:31:12.978ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 457 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f490b6e9-7a1d-4c87-95fc-edcea943e521 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
352862025-03-07T23:31:12.978ZINFOtest_unauthorized (external client test context): client received response status = 405
352872025-03-07T23:31:12.978ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/images/demo-image/demote?project=demo-project
352882025-03-07T23:31:12.978ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352892025-03-07T23:31:12.978ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6884c3e6-af26-4945-81f7-9696a13539ee uri = /v1/images/demo-image/demote?project=demo-project
352902025-03-07T23:31:12.978ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 6884c3e6-af26-4945-81f7-9696a13539ee response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
352912025-03-07T23:31:12.978ZINFOtest_unauthorized (external client test context): client received response status = 405
352922025-03-07T23:31:12.979ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/images/demo-image/demote?project=demo-project
352932025-03-07T23:31:12.979ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352942025-03-07T23:31:12.979ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 963f5d5c-a10e-4c3a-9651-a48ac0ae9a93 uri = /v1/images/demo-image/demote?project=demo-project
352952025-03-07T23:31:12.979ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 963f5d5c-a10e-4c3a-9651-a48ac0ae9a93 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
352962025-03-07T23:31:12.979ZINFOtest_unauthorized (external client test context): client received response status = 405
352972025-03-07T23:31:12.979ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/images/demo-image/demote?project=demo-project
352982025-03-07T23:31:12.979ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
352992025-03-07T23:31:12.979ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3f91e083-01ed-44b1-8cac-a90659815f4e uri = /v1/images/demo-image/demote?project=demo-project
353002025-03-07T23:31:12.979ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3f91e083-01ed-44b1-8cac-a90659815f4e response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
353012025-03-07T23:31:12.980ZINFOtest_unauthorized (external client test context): client received response status = 405
353022025-03-07T23:31:12.980ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/images/demo-image/demote?project=demo-project
353032025-03-07T23:31:12.980ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
353042025-03-07T23:31:12.980ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9e76effb-d29d-4f12-891c-2e01957922ae uri = /v1/images/demo-image/demote?project=demo-project
353052025-03-07T23:31:12.981ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 828 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9e76effb-d29d-4f12-891c-2e01957922ae response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
353062025-03-07T23:31:12.984ZINFOtest_unauthorized (external client test context): client received response status = 405
353072025-03-07T23:31:12.984ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/images/demo-image/demote?project=demo-project
353082025-03-07T23:31:12.988ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
353092025-03-07T23:31:12.988ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1af0911b-3c7a-4fbc-8572-77014b51afb2 uri = /v1/images/demo-image/demote?project=demo-project
353102025-03-07T23:31:12.988ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 1af0911b-3c7a-4fbc-8572-77014b51afb2 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
353112025-03-07T23:31:12.988ZINFOtest_unauthorized (external client test context): client received response status = 405
353122025-03-07T23:31:12.988ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/images/demo-image/demote?project=demo-project
353132025-03-07T23:31:12.988ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/images/demo-image/demote?project=demo-project
353142025-03-07T23:31:12.990ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4e03442d-2dd9-49e0-afb6-02570fbc5493 uri = /v1/images/demo-image/demote?project=demo-project
353152025-03-07T23:31:12.990ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 4e03442d-2dd9-49e0-afb6-02570fbc5493 response_code = 405 uri = /v1/images/demo-image/demote?project=demo-project
353162025-03-07T23:31:12.990ZINFOtest_unauthorized (external client test context): client received response status = 405
353172025-03-07T23:31:12.990ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/images/demo-image/demote?project=demo-project
353182025-03-07T23:31:12.990ZINFOtest_unauthorized: test: begin endpoint url = /v1/snapshots?project=demo-project
353192025-03-07T23:31:12.990ZINFOtest_unauthorized: test: privileged GET url = /v1/snapshots?project=demo-project
353202025-03-07T23:31:12.990ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
353212025-03-07T23:31:12.990ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b uri = /v1/snapshots?project=demo-project
353222025-03-07T23:31:12.990ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b uri = /v1/snapshots?project=demo-project
353232025-03-07T23:31:12.990ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots?project=demo-project
353242025-03-07T23:31:12.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353252025-03-07T23:31:12.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353262025-03-07T23:31:12.991ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353272025-03-07T23:31:12.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353282025-03-07T23:31:12.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353292025-03-07T23:31:12.995ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353302025-03-07T23:31:12.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
353312025-03-07T23:31:12.997ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
353322025-03-07T23:31:12.997ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353332025-03-07T23:31:12.997ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353342025-03-07T23:31:13.002ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353352025-03-07T23:31:13.005ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
353362025-03-07T23:31:13.005ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353372025-03-07T23:31:13.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353382025-03-07T23:31:13.006ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353392025-03-07T23:31:13.013ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
353402025-03-07T23:31:13.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
353412025-03-07T23:31:13.021ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353422025-03-07T23:31:13.021ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353432025-03-07T23:31:13.022ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353442025-03-07T23:31:13.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
353452025-03-07T23:31:13.044ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
353462025-03-07T23:31:13.044ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353472025-03-07T23:31:13.044ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353482025-03-07T23:31:13.045ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353492025-03-07T23:31:13.047ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
353502025-03-07T23:31:13.047ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
353512025-03-07T23:31:13.047ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
353522025-03-07T23:31:13.048ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
353532025-03-07T23:31:13.050ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
353542025-03-07T23:31:13.054ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
353552025-03-07T23:31:13.054ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b uri = /v1/snapshots?project=demo-project
353562025-03-07T23:31:13.054ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353572025-03-07T23:31:13.055ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353582025-03-07T23:31:13.055ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353592025-03-07T23:31:13.062ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353602025-03-07T23:31:13.062ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353612025-03-07T23:31:13.063ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353622025-03-07T23:31:13.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
353632025-03-07T23:31:13.066ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
353642025-03-07T23:31:13.066ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353652025-03-07T23:31:13.066ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353662025-03-07T23:31:13.066ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353672025-03-07T23:31:13.071ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
353682025-03-07T23:31:13.071ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353692025-03-07T23:31:13.071ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353702025-03-07T23:31:13.072ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353712025-03-07T23:31:13.075ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
353722025-03-07T23:31:13.075ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353732025-03-07T23:31:13.075ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353742025-03-07T23:31:13.085ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353752025-03-07T23:31:13.092ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
353762025-03-07T23:31:13.101ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
353772025-03-07T23:31:13.101ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
353782025-03-07T23:31:13.101ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
353792025-03-07T23:31:13.101ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353802025-03-07T23:31:13.102ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353812025-03-07T23:31:13.102ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353822025-03-07T23:31:13.103ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
353832025-03-07T23:31:13.104ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
353842025-03-07T23:31:13.104ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
353852025-03-07T23:31:13.111ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
353862025-03-07T23:31:13.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353872025-03-07T23:31:13.111ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353882025-03-07T23:31:13.113ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353892025-03-07T23:31:13.120ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
353902025-03-07T23:31:13.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353912025-03-07T23:31:13.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353922025-03-07T23:31:13.122ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353932025-03-07T23:31:13.133ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
353942025-03-07T23:31:13.153ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
353952025-03-07T23:31:13.153ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database uri = /v1/snapshots?project=demo-project
353962025-03-07T23:31:13.153ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
353972025-03-07T23:31:13.154ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
353982025-03-07T23:31:13.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
353992025-03-07T23:31:13.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
354002025-03-07T23:31:13.158ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
354012025-03-07T23:31:13.159ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
354022025-03-07T23:31:13.164ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 175009 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = aa54b912-07d0-4be4-834f-128e8f18da5b response_code = 200 uri = /v1/snapshots?project=demo-project
354032025-03-07T23:31:13.165ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
354042025-03-07T23:31:13.165ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
354052025-03-07T23:31:13.166ZINFOtest_unauthorized (external client test context): client received response status = 200
354062025-03-07T23:31:13.166ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/snapshots?project=demo-project
354072025-03-07T23:31:13.166ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
354082025-03-07T23:31:13.166ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 uri = /v1/snapshots?project=demo-project
354092025-03-07T23:31:13.167ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 uri = /v1/snapshots?project=demo-project
354102025-03-07T23:31:13.167ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots?project=demo-project
354112025-03-07T23:31:13.167ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354122025-03-07T23:31:13.167ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354132025-03-07T23:31:13.167ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354142025-03-07T23:31:13.169ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
354152025-03-07T23:31:13.169ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
354162025-03-07T23:31:13.173ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354172025-03-07T23:31:13.173ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354182025-03-07T23:31:13.173ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354192025-03-07T23:31:13.175ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
354202025-03-07T23:31:13.175ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
354212025-03-07T23:31:13.176ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354222025-03-07T23:31:13.176ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354232025-03-07T23:31:13.176ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354242025-03-07T23:31:13.178ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
354252025-03-07T23:31:13.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354262025-03-07T23:31:13.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354272025-03-07T23:31:13.179ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354282025-03-07T23:31:13.182ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
354292025-03-07T23:31:13.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
354302025-03-07T23:31:13.193ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354312025-03-07T23:31:13.193ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354322025-03-07T23:31:13.194ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354332025-03-07T23:31:13.201ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
354342025-03-07T23:31:13.202ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
354352025-03-07T23:31:13.202ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354362025-03-07T23:31:13.202ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354372025-03-07T23:31:13.202ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354382025-03-07T23:31:13.205ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
354392025-03-07T23:31:13.205ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
354402025-03-07T23:31:13.205ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
354412025-03-07T23:31:13.206ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
354422025-03-07T23:31:13.209ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
354432025-03-07T23:31:13.217ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
354442025-03-07T23:31:13.217ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 uri = /v1/snapshots?project=demo-project
354452025-03-07T23:31:13.217ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database uri = /v1/snapshots?project=demo-project
354462025-03-07T23:31:13.217ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
354472025-03-07T23:31:13.219ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
354482025-03-07T23:31:13.222ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database uri = /v1/snapshots?project=demo-project
354492025-03-07T23:31:13.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
354502025-03-07T23:31:13.223ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
354512025-03-07T23:31:13.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
354522025-03-07T23:31:13.225ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
354532025-03-07T23:31:13.225ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database uri = /v1/snapshots?project=demo-project
354542025-03-07T23:31:13.225ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
354552025-03-07T23:31:13.226ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
354562025-03-07T23:31:13.229ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
354572025-03-07T23:31:13.229ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database uri = /v1/snapshots?project=demo-project
354582025-03-07T23:31:13.229ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
354592025-03-07T23:31:13.230ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
354602025-03-07T23:31:13.234ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
354612025-03-07T23:31:13.235ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database uri = /v1/snapshots?project=demo-project
354622025-03-07T23:31:13.235ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
354632025-03-07T23:31:13.235ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
354642025-03-07T23:31:13.238ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
354652025-03-07T23:31:13.270ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/snapshots?project=demo-project
354662025-03-07T23:31:13.271ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 104085 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = a5c7a7c5-0459-455f-9d48-83f6968fb856 response_code = 404 uri = /v1/snapshots?project=demo-project
354672025-03-07T23:31:13.271ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
354682025-03-07T23:31:13.271ZINFOtest_unauthorized (external client test context): client received response status = 404
354692025-03-07T23:31:13.271ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/snapshots?project=demo-project
354702025-03-07T23:31:13.272ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
354712025-03-07T23:31:13.272ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9369757-ed0d-4921-9ec5-e3cefc6c3fdb uri = /v1/snapshots?project=demo-project
354722025-03-07T23:31:13.272ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9369757-ed0d-4921-9ec5-e3cefc6c3fdb uri = /v1/snapshots?project=demo-project
354732025-03-07T23:31:13.272ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9369757-ed0d-4921-9ec5-e3cefc6c3fdb uri = /v1/snapshots?project=demo-project
354742025-03-07T23:31:13.272ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9369757-ed0d-4921-9ec5-e3cefc6c3fdb uri = /v1/snapshots?project=demo-project
354752025-03-07T23:31:13.272ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 328 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e9369757-ed0d-4921-9ec5-e3cefc6c3fdb response_code = 401 uri = /v1/snapshots?project=demo-project
354762025-03-07T23:31:13.272ZINFOtest_unauthorized (external client test context): client received response status = 401
354772025-03-07T23:31:13.272ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/snapshots?project=demo-project
354782025-03-07T23:31:13.272ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
354792025-03-07T23:31:13.273ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6372c781-e928-43d3-ab95-cad5cfe18e23 uri = /v1/snapshots?project=demo-project
354802025-03-07T23:31:13.273ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6372c781-e928-43d3-ab95-cad5cfe18e23 uri = /v1/snapshots?project=demo-project
354812025-03-07T23:31:13.273ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6372c781-e928-43d3-ab95-cad5cfe18e23 uri = /v1/snapshots?project=demo-project
354822025-03-07T23:31:13.273ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 713 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6372c781-e928-43d3-ab95-cad5cfe18e23 response_code = 401 uri = /v1/snapshots?project=demo-project
354832025-03-07T23:31:13.274ZINFOtest_unauthorized (external client test context): client received response status = 401
354842025-03-07T23:31:13.274ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/snapshots?project=demo-project
354852025-03-07T23:31:13.274ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
354862025-03-07T23:31:13.274ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 12cca19d-4143-4d58-9fd4-f74ff706edc3 uri = /v1/snapshots?project=demo-project
354872025-03-07T23:31:13.274ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 12cca19d-4143-4d58-9fd4-f74ff706edc3 uri = /v1/snapshots?project=demo-project
354882025-03-07T23:31:13.275ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4787:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Snapshot>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4811:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Snapshot>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::Snapshot>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 12cca19d-4143-4d58-9fd4-f74ff706edc3 uri = /v1/snapshots?project=demo-project
354892025-03-07T23:31:13.275ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1110 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 12cca19d-4143-4d58-9fd4-f74ff706edc3 response_code = 401 uri = /v1/snapshots?project=demo-project
354902025-03-07T23:31:13.275ZINFOtest_unauthorized (external client test context): client received response status = 401
354912025-03-07T23:31:13.275ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/snapshots?project=demo-project
354922025-03-07T23:31:13.275ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
354932025-03-07T23:31:13.275ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 907edf15-b7bf-4544-9375-7370db2f6996 uri = /v1/snapshots?project=demo-project
354942025-03-07T23:31:13.275ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 907edf15-b7bf-4544-9375-7370db2f6996 response_code = 405 uri = /v1/snapshots?project=demo-project
354952025-03-07T23:31:13.276ZINFOtest_unauthorized (external client test context): client received response status = 405
354962025-03-07T23:31:13.276ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/snapshots?project=demo-project
354972025-03-07T23:31:13.276ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
354982025-03-07T23:31:13.276ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1e271b5b-70fd-4c29-a37e-f2def65971d4 uri = /v1/snapshots?project=demo-project
354992025-03-07T23:31:13.276ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1e271b5b-70fd-4c29-a37e-f2def65971d4 response_code = 405 uri = /v1/snapshots?project=demo-project
355002025-03-07T23:31:13.276ZINFOtest_unauthorized (external client test context): client received response status = 405
355012025-03-07T23:31:13.276ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/snapshots?project=demo-project
355022025-03-07T23:31:13.276ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355032025-03-07T23:31:13.277ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9e93624a-9132-4d96-9944-4443c4aff768 uri = /v1/snapshots?project=demo-project
355042025-03-07T23:31:13.277ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9e93624a-9132-4d96-9944-4443c4aff768 response_code = 405 uri = /v1/snapshots?project=demo-project
355052025-03-07T23:31:13.277ZINFOtest_unauthorized (external client test context): client received response status = 405
355062025-03-07T23:31:13.277ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/snapshots?project=demo-project
355072025-03-07T23:31:13.277ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355082025-03-07T23:31:13.277ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9e41f2ae-b56c-417f-b04a-ae42efb29091 uri = /v1/snapshots?project=demo-project
355092025-03-07T23:31:13.277ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 9e41f2ae-b56c-417f-b04a-ae42efb29091 response_code = 405 uri = /v1/snapshots?project=demo-project
355102025-03-07T23:31:13.277ZINFOtest_unauthorized (external client test context): client received response status = 405
355112025-03-07T23:31:13.277ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/snapshots?project=demo-project
355122025-03-07T23:31:13.277ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355132025-03-07T23:31:13.278ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b uri = /v1/snapshots?project=demo-project
355142025-03-07T23:31:13.278ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b uri = /v1/snapshots?project=demo-project
355152025-03-07T23:31:13.278ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots?project=demo-project
355162025-03-07T23:31:13.278ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355172025-03-07T23:31:13.278ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355182025-03-07T23:31:13.279ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355192025-03-07T23:31:13.281ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355202025-03-07T23:31:13.281ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355212025-03-07T23:31:13.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355222025-03-07T23:31:13.285ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
355232025-03-07T23:31:13.285ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
355242025-03-07T23:31:13.285ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355252025-03-07T23:31:13.285ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355262025-03-07T23:31:13.286ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355272025-03-07T23:31:13.288ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
355282025-03-07T23:31:13.289ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355292025-03-07T23:31:13.289ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355302025-03-07T23:31:13.289ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355312025-03-07T23:31:13.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
355322025-03-07T23:31:13.300ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
355332025-03-07T23:31:13.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355342025-03-07T23:31:13.300ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355352025-03-07T23:31:13.301ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355362025-03-07T23:31:13.304ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
355372025-03-07T23:31:13.304ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
355382025-03-07T23:31:13.304ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355392025-03-07T23:31:13.304ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355402025-03-07T23:31:13.305ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355412025-03-07T23:31:13.308ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
355422025-03-07T23:31:13.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
355432025-03-07T23:31:13.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
355442025-03-07T23:31:13.308ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
355452025-03-07T23:31:13.310ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
355462025-03-07T23:31:13.314ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
355472025-03-07T23:31:13.314ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b uri = /v1/snapshots?project=demo-project
355482025-03-07T23:31:13.314ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database uri = /v1/snapshots?project=demo-project
355492025-03-07T23:31:13.314ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
355502025-03-07T23:31:13.315ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
355512025-03-07T23:31:13.318ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database uri = /v1/snapshots?project=demo-project
355522025-03-07T23:31:13.318ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
355532025-03-07T23:31:13.319ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
355542025-03-07T23:31:13.325ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
355552025-03-07T23:31:13.325ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
355562025-03-07T23:31:13.326ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database uri = /v1/snapshots?project=demo-project
355572025-03-07T23:31:13.326ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
355582025-03-07T23:31:13.328ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
355592025-03-07T23:31:13.340ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
355602025-03-07T23:31:13.341ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database uri = /v1/snapshots?project=demo-project
355612025-03-07T23:31:13.341ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
355622025-03-07T23:31:13.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
355632025-03-07T23:31:13.349ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
355642025-03-07T23:31:13.349ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database uri = /v1/snapshots?project=demo-project
355652025-03-07T23:31:13.349ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
355662025-03-07T23:31:13.360ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
355672025-03-07T23:31:13.365ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
355682025-03-07T23:31:13.393ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/snapshots?project=demo-project
355692025-03-07T23:31:13.394ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 115988 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c30d4e84-9140-4532-8698-e48df257826b response_code = 404 uri = /v1/snapshots?project=demo-project
355702025-03-07T23:31:13.394ZINFOtest_unauthorized (external client test context): client received response status = 404
355712025-03-07T23:31:13.394ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/snapshots?project=demo-project
355722025-03-07T23:31:13.394ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355732025-03-07T23:31:13.395ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c8762492-29fd-4858-8502-45c47087b1e3 uri = /v1/snapshots?project=demo-project
355742025-03-07T23:31:13.395ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c8762492-29fd-4858-8502-45c47087b1e3 uri = /v1/snapshots?project=demo-project
355752025-03-07T23:31:13.395ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c8762492-29fd-4858-8502-45c47087b1e3 uri = /v1/snapshots?project=demo-project
355762025-03-07T23:31:13.395ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c8762492-29fd-4858-8502-45c47087b1e3 uri = /v1/snapshots?project=demo-project
355772025-03-07T23:31:13.395ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 622 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c8762492-29fd-4858-8502-45c47087b1e3 response_code = 401 uri = /v1/snapshots?project=demo-project
355782025-03-07T23:31:13.395ZINFOtest_unauthorized (external client test context): client received response status = 401
355792025-03-07T23:31:13.396ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/snapshots?project=demo-project
355802025-03-07T23:31:13.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355812025-03-07T23:31:13.396ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 21103148-95cf-4cc7-98a4-32d91d657029 uri = /v1/snapshots?project=demo-project
355822025-03-07T23:31:13.396ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 21103148-95cf-4cc7-98a4-32d91d657029 uri = /v1/snapshots?project=demo-project
355832025-03-07T23:31:13.396ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 21103148-95cf-4cc7-98a4-32d91d657029 uri = /v1/snapshots?project=demo-project
355842025-03-07T23:31:13.396ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 224 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 21103148-95cf-4cc7-98a4-32d91d657029 response_code = 401 uri = /v1/snapshots?project=demo-project
355852025-03-07T23:31:13.396ZINFOtest_unauthorized (external client test context): client received response status = 401
355862025-03-07T23:31:13.396ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/snapshots?project=demo-project
355872025-03-07T23:31:13.396ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355882025-03-07T23:31:13.397ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 302db35d-9676-449b-91ab-ade6026686f4 uri = /v1/snapshots?project=demo-project
355892025-03-07T23:31:13.398ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 302db35d-9676-449b-91ab-ade6026686f4 uri = /v1/snapshots?project=demo-project
355902025-03-07T23:31:13.399ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4822:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Snapshot>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4836:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Snapshot>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::SnapshotCreate>), dropshot::handler::HttpResponseCreated<nexus_types::external_api::views::Snapshot>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 302db35d-9676-449b-91ab-ade6026686f4 uri = /v1/snapshots?project=demo-project
355912025-03-07T23:31:13.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1980 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 302db35d-9676-449b-91ab-ade6026686f4 response_code = 401 uri = /v1/snapshots?project=demo-project
355922025-03-07T23:31:13.399ZINFOtest_unauthorized (external client test context): client received response status = 401
355932025-03-07T23:31:13.399ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/snapshots?project=demo-project
355942025-03-07T23:31:13.399ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
355952025-03-07T23:31:13.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 79047258-3bf1-44a3-bfa2-ded32fae3416 uri = /v1/snapshots?project=demo-project
355962025-03-07T23:31:13.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 79047258-3bf1-44a3-bfa2-ded32fae3416 response_code = 405 uri = /v1/snapshots?project=demo-project
355972025-03-07T23:31:13.399ZINFOtest_unauthorized (external client test context): client received response status = 405
355982025-03-07T23:31:13.400ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/snapshots?project=demo-project
355992025-03-07T23:31:13.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356002025-03-07T23:31:13.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e42f98c7-661c-4bf2-9472-5784dd7ef281 uri = /v1/snapshots?project=demo-project
356012025-03-07T23:31:13.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e42f98c7-661c-4bf2-9472-5784dd7ef281 response_code = 405 uri = /v1/snapshots?project=demo-project
356022025-03-07T23:31:13.400ZINFOtest_unauthorized (external client test context): client received response status = 405
356032025-03-07T23:31:13.400ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/snapshots?project=demo-project
356042025-03-07T23:31:13.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356052025-03-07T23:31:13.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ec154c42-3a5b-4594-b72c-351b3daa69de uri = /v1/snapshots?project=demo-project
356062025-03-07T23:31:13.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ec154c42-3a5b-4594-b72c-351b3daa69de response_code = 405 uri = /v1/snapshots?project=demo-project
356072025-03-07T23:31:13.400ZINFOtest_unauthorized (external client test context): client received response status = 405
356082025-03-07T23:31:13.401ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/snapshots?project=demo-project
356092025-03-07T23:31:13.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356102025-03-07T23:31:13.401ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c9a9a453-c21b-4413-ab84-220307d6bdf2 uri = /v1/snapshots?project=demo-project
356112025-03-07T23:31:13.401ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = c9a9a453-c21b-4413-ab84-220307d6bdf2 response_code = 405 uri = /v1/snapshots?project=demo-project
356122025-03-07T23:31:13.401ZINFOtest_unauthorized (external client test context): client received response status = 405
356132025-03-07T23:31:13.401ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/snapshots?project=demo-project
356142025-03-07T23:31:13.401ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356152025-03-07T23:31:13.401ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e57ae8fd-2334-4275-a56d-1ebadf4333bf uri = /v1/snapshots?project=demo-project
356162025-03-07T23:31:13.401ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = e57ae8fd-2334-4275-a56d-1ebadf4333bf response_code = 405 uri = /v1/snapshots?project=demo-project
356172025-03-07T23:31:13.402ZINFOtest_unauthorized (external client test context): client received response status = 405
356182025-03-07T23:31:13.402ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/snapshots?project=demo-project
356192025-03-07T23:31:13.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356202025-03-07T23:31:13.402ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6de335fe-de43-466d-9f25-17e9b5fe4ded uri = /v1/snapshots?project=demo-project
356212025-03-07T23:31:13.402ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6de335fe-de43-466d-9f25-17e9b5fe4ded response_code = 405 uri = /v1/snapshots?project=demo-project
356222025-03-07T23:31:13.402ZINFOtest_unauthorized (external client test context): client received response status = 405
356232025-03-07T23:31:13.402ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/snapshots?project=demo-project
356242025-03-07T23:31:13.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356252025-03-07T23:31:13.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f928c38a-67e6-42e1-abed-1ba07dc98a34 uri = /v1/snapshots?project=demo-project
356262025-03-07T23:31:13.403ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f928c38a-67e6-42e1-abed-1ba07dc98a34 response_code = 405 uri = /v1/snapshots?project=demo-project
356272025-03-07T23:31:13.403ZINFOtest_unauthorized (external client test context): client received response status = 405
356282025-03-07T23:31:13.403ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/snapshots?project=demo-project
356292025-03-07T23:31:13.403ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356302025-03-07T23:31:13.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 441e544a-548f-4add-82a5-8c4755c979c8 uri = /v1/snapshots?project=demo-project
356312025-03-07T23:31:13.403ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 441e544a-548f-4add-82a5-8c4755c979c8 response_code = 405 uri = /v1/snapshots?project=demo-project
356322025-03-07T23:31:13.403ZINFOtest_unauthorized (external client test context): client received response status = 405
356332025-03-07T23:31:13.403ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/snapshots?project=demo-project
356342025-03-07T23:31:13.403ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots?project=demo-project
356352025-03-07T23:31:13.404ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d uri = /v1/snapshots?project=demo-project
356362025-03-07T23:31:13.404ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d uri = /v1/snapshots?project=demo-project
356372025-03-07T23:31:13.404ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots?project=demo-project
356382025-03-07T23:31:13.404ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356392025-03-07T23:31:13.404ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356402025-03-07T23:31:13.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356412025-03-07T23:31:13.409ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356422025-03-07T23:31:13.409ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356432025-03-07T23:31:13.410ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356442025-03-07T23:31:13.412ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
356452025-03-07T23:31:13.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
356462025-03-07T23:31:13.412ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = da8a8d70-4c63-438b-96fe-1f4c11a4513a uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
356472025-03-07T23:31:13.412ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = da8a8d70-4c63-438b-96fe-1f4c11a4513a resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
356482025-03-07T23:31:13.412ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = da8a8d70-4c63-438b-96fe-1f4c11a4513a roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
356492025-03-07T23:31:13.412ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = da8a8d70-4c63-438b-96fe-1f4c11a4513a resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
356502025-03-07T23:31:13.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
356512025-03-07T23:31:13.413ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
356522025-03-07T23:31:13.413ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356532025-03-07T23:31:13.413ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356542025-03-07T23:31:13.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356552025-03-07T23:31:13.416ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 4422 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = da8a8d70-4c63-438b-96fe-1f4c11a4513a response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
356562025-03-07T23:31:13.416ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "da8a8d70-4c63-438b-96fe-1f4c11a4513a", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:13 GMT"} })
356572025-03-07T23:31:13.417ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
356582025-03-07T23:31:13.417ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
356592025-03-07T23:31:13.417ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356602025-03-07T23:31:13.417ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356612025-03-07T23:31:13.418ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356622025-03-07T23:31:13.419ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 165a69ed-7c32-4f5f-8933-94af54ae01f3 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
356632025-03-07T23:31:13.419ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 165a69ed-7c32-4f5f-8933-94af54ae01f3 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
356642025-03-07T23:31:13.419ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 165a69ed-7c32-4f5f-8933-94af54ae01f3 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
356652025-03-07T23:31:13.419ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 165a69ed-7c32-4f5f-8933-94af54ae01f3 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
356662025-03-07T23:31:13.421ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
356672025-03-07T23:31:13.426ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
356682025-03-07T23:31:13.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356692025-03-07T23:31:13.426ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356702025-03-07T23:31:13.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356712025-03-07T23:31:13.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
356722025-03-07T23:31:13.429ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
356732025-03-07T23:31:13.429ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356742025-03-07T23:31:13.430ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356752025-03-07T23:31:13.430ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356762025-03-07T23:31:13.432ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14050 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 165a69ed-7c32-4f5f-8933-94af54ae01f3 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
356772025-03-07T23:31:13.433ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
356782025-03-07T23:31:13.433ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
356792025-03-07T23:31:13.433ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
356802025-03-07T23:31:13.434ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
356812025-03-07T23:31:13.435ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "165a69ed-7c32-4f5f-8933-94af54ae01f3", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:13 GMT"} })
356822025-03-07T23:31:13.435ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
356832025-03-07T23:31:13.435ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
356842025-03-07T23:31:13.436ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
356852025-03-07T23:31:13.436ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
356862025-03-07T23:31:13.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
356872025-03-07T23:31:13.443ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d uri = /v1/snapshots?project=demo-project
356882025-03-07T23:31:13.443ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
356892025-03-07T23:31:13.443ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
356902025-03-07T23:31:13.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
356912025-03-07T23:31:13.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
356922025-03-07T23:31:13.455ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
356932025-03-07T23:31:13.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
356942025-03-07T23:31:13.462ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
356952025-03-07T23:31:13.463ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
356962025-03-07T23:31:13.463ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
356972025-03-07T23:31:13.463ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
356982025-03-07T23:31:13.463ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
356992025-03-07T23:31:13.468ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
357002025-03-07T23:31:13.469ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
357012025-03-07T23:31:13.470ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
357022025-03-07T23:31:13.471ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
357032025-03-07T23:31:13.474ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
357042025-03-07T23:31:13.474ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
357052025-03-07T23:31:13.474ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
357062025-03-07T23:31:13.475ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
357072025-03-07T23:31:13.484ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
357082025-03-07T23:31:13.501ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
357092025-03-07T23:31:13.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/snapshots?project=demo-project
357102025-03-07T23:31:13.502ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots?project=demo-project
357112025-03-07T23:31:13.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
357122025-03-07T23:31:13.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
357132025-03-07T23:31:13.505ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
357142025-03-07T23:31:13.509ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots?project=demo-project
357152025-03-07T23:31:13.509ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
357162025-03-07T23:31:13.509ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
357172025-03-07T23:31:13.509ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
357182025-03-07T23:31:13.515ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots?project=demo-project
357192025-03-07T23:31:13.516ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
357202025-03-07T23:31:13.516ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
357212025-03-07T23:31:13.517ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
357222025-03-07T23:31:13.526ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots?project=demo-project
357232025-03-07T23:31:13.541ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/snapshots?project=demo-project
357242025-03-07T23:31:13.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database uri = /v1/snapshots?project=demo-project
357252025-03-07T23:31:13.541ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d roles = RoleSet { roles: {} } uri = /v1/snapshots?project=demo-project
357262025-03-07T23:31:13.542ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d resource = Database result = Ok(()) uri = /v1/snapshots?project=demo-project
357272025-03-07T23:31:13.553ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 149596 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = cd74d368-e036-406c-81b1-6a11a9adba5d response_code = 200 uri = /v1/snapshots?project=demo-project
357282025-03-07T23:31:13.554ZINFOtest_unauthorized (external client test context): client received response status = 200
357292025-03-07T23:31:13.555ZINFOtest_unauthorized: test: begin endpoint url = /v1/snapshots/demo-snapshot?project=demo-project
357302025-03-07T23:31:13.555ZINFOtest_unauthorized: test: privileged GET url = /v1/snapshots/demo-snapshot?project=demo-project
357312025-03-07T23:31:13.555ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
357322025-03-07T23:31:13.555ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 uri = /v1/snapshots/demo-snapshot?project=demo-project
357332025-03-07T23:31:13.555ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 uri = /v1/snapshots/demo-snapshot?project=demo-project
357342025-03-07T23:31:13.555ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots/demo-snapshot?project=demo-project
357352025-03-07T23:31:13.555ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357362025-03-07T23:31:13.556ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357372025-03-07T23:31:13.558ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357382025-03-07T23:31:13.560ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357392025-03-07T23:31:13.561ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357402025-03-07T23:31:13.562ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357412025-03-07T23:31:13.564ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
357422025-03-07T23:31:13.564ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
357432025-03-07T23:31:13.566ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
357442025-03-07T23:31:13.568ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
357452025-03-07T23:31:13.568ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
357462025-03-07T23:31:13.568ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
357472025-03-07T23:31:13.568ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
357482025-03-07T23:31:13.569ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
357492025-03-07T23:31:13.569ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357502025-03-07T23:31:13.569ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357512025-03-07T23:31:13.570ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357522025-03-07T23:31:13.574ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
357532025-03-07T23:31:13.580ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357542025-03-07T23:31:13.580ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357552025-03-07T23:31:13.581ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357562025-03-07T23:31:13.583ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
357572025-03-07T23:31:13.605ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
357582025-03-07T23:31:13.605ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357592025-03-07T23:31:13.605ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357602025-03-07T23:31:13.606ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357612025-03-07T23:31:13.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
357622025-03-07T23:31:13.609ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
357632025-03-07T23:31:13.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357642025-03-07T23:31:13.609ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357652025-03-07T23:31:13.609ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357662025-03-07T23:31:13.612ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
357672025-03-07T23:31:13.612ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
357682025-03-07T23:31:13.612ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
357692025-03-07T23:31:13.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
357702025-03-07T23:31:13.614ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
357712025-03-07T23:31:13.619ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
357722025-03-07T23:31:13.619ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 uri = /v1/snapshots/demo-snapshot?project=demo-project
357732025-03-07T23:31:13.619ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
357742025-03-07T23:31:13.619ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357752025-03-07T23:31:13.620ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357762025-03-07T23:31:13.624ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
357772025-03-07T23:31:13.624ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357782025-03-07T23:31:13.624ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357792025-03-07T23:31:13.627ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
357802025-03-07T23:31:13.627ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357812025-03-07T23:31:13.627ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357822025-03-07T23:31:13.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
357832025-03-07T23:31:13.633ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
357842025-03-07T23:31:13.633ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
357852025-03-07T23:31:13.633ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357862025-03-07T23:31:13.633ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357872025-03-07T23:31:13.641ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
357882025-03-07T23:31:13.641ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
357892025-03-07T23:31:13.641ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357902025-03-07T23:31:13.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357912025-03-07T23:31:13.645ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
357922025-03-07T23:31:13.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
357932025-03-07T23:31:13.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357942025-03-07T23:31:13.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357952025-03-07T23:31:13.649ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots/demo-snapshot?project=demo-project
357962025-03-07T23:31:13.667ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
357972025-03-07T23:31:13.667ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 112185 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0bbb023f-a92e-49b5-b2d1-b233dda1e4d8 response_code = 200 uri = /v1/snapshots/demo-snapshot?project=demo-project
357982025-03-07T23:31:13.668ZINFOtest_unauthorized (external client test context): client received response status = 200
357992025-03-07T23:31:13.668ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
358002025-03-07T23:31:13.668ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358012025-03-07T23:31:13.668ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe uri = /v1/snapshots/demo-snapshot?project=demo-project
358022025-03-07T23:31:13.668ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe uri = /v1/snapshots/demo-snapshot?project=demo-project
358032025-03-07T23:31:13.668ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots/demo-snapshot?project=demo-project
358042025-03-07T23:31:13.668ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358052025-03-07T23:31:13.668ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358062025-03-07T23:31:13.669ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358072025-03-07T23:31:13.670ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358082025-03-07T23:31:13.671ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358092025-03-07T23:31:13.671ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358102025-03-07T23:31:13.673ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
358112025-03-07T23:31:13.673ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
358122025-03-07T23:31:13.673ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358132025-03-07T23:31:13.673ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358142025-03-07T23:31:13.673ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358152025-03-07T23:31:13.676ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
358162025-03-07T23:31:13.676ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358172025-03-07T23:31:13.676ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358182025-03-07T23:31:13.676ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358192025-03-07T23:31:13.678ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
358202025-03-07T23:31:13.681ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
358212025-03-07T23:31:13.681ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358222025-03-07T23:31:13.681ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358232025-03-07T23:31:13.682ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358242025-03-07T23:31:13.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
358252025-03-07T23:31:13.684ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
358262025-03-07T23:31:13.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358272025-03-07T23:31:13.684ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358282025-03-07T23:31:13.684ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358292025-03-07T23:31:13.687ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
358302025-03-07T23:31:13.687ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
358312025-03-07T23:31:13.687ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
358322025-03-07T23:31:13.688ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
358332025-03-07T23:31:13.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
358342025-03-07T23:31:13.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
358352025-03-07T23:31:13.693ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe uri = /v1/snapshots/demo-snapshot?project=demo-project
358362025-03-07T23:31:13.693ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
358372025-03-07T23:31:13.693ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358382025-03-07T23:31:13.694ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
358392025-03-07T23:31:13.696ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
358402025-03-07T23:31:13.696ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358412025-03-07T23:31:13.697ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
358422025-03-07T23:31:13.698ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
358432025-03-07T23:31:13.699ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358442025-03-07T23:31:13.699ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
358452025-03-07T23:31:13.702ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
358462025-03-07T23:31:13.702ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
358472025-03-07T23:31:13.702ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
358482025-03-07T23:31:13.702ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358492025-03-07T23:31:13.703ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
358502025-03-07T23:31:13.706ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
358512025-03-07T23:31:13.706ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
358522025-03-07T23:31:13.706ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358532025-03-07T23:31:13.708ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
358542025-03-07T23:31:13.715ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
358552025-03-07T23:31:13.717ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
358562025-03-07T23:31:13.717ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358572025-03-07T23:31:13.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
358582025-03-07T23:31:13.721ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
358592025-03-07T23:31:13.735ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } result = Err(ObjectNotFound { type_name: Snapshot, lookup_type: ByName("demo-snapshot") }) uri = /v1/snapshots/demo-snapshot?project=demo-project
358602025-03-07T23:31:13.735ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: snapshot with name "demo-snapshot" error_message_internal = not found: snapshot with name "demo-snapshot" latency_us = 67516 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7296a304-7855-45ff-be5c-54788b780fbe response_code = 404 uri = /v1/snapshots/demo-snapshot?project=demo-project
358612025-03-07T23:31:13.736ZINFOtest_unauthorized (external client test context): client received response status = 404
358622025-03-07T23:31:13.736ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
358632025-03-07T23:31:13.736ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358642025-03-07T23:31:13.736ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 28b78bdf-c4e7-41e4-acdd-5b14bd485b14 uri = /v1/snapshots/demo-snapshot?project=demo-project
358652025-03-07T23:31:13.736ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 28b78bdf-c4e7-41e4-acdd-5b14bd485b14 uri = /v1/snapshots/demo-snapshot?project=demo-project
358662025-03-07T23:31:13.736ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 28b78bdf-c4e7-41e4-acdd-5b14bd485b14 uri = /v1/snapshots/demo-snapshot?project=demo-project
358672025-03-07T23:31:13.736ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 28b78bdf-c4e7-41e4-acdd-5b14bd485b14 uri = /v1/snapshots/demo-snapshot?project=demo-project
358682025-03-07T23:31:13.736ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 296 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 28b78bdf-c4e7-41e4-acdd-5b14bd485b14 response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
358692025-03-07T23:31:13.737ZINFOtest_unauthorized (external client test context): client received response status = 401
358702025-03-07T23:31:13.737ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
358712025-03-07T23:31:13.737ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358722025-03-07T23:31:13.737ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b10c927-8fea-42af-b0ab-ca6907261cc9 uri = /v1/snapshots/demo-snapshot?project=demo-project
358732025-03-07T23:31:13.737ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b10c927-8fea-42af-b0ab-ca6907261cc9 uri = /v1/snapshots/demo-snapshot?project=demo-project
358742025-03-07T23:31:13.737ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b10c927-8fea-42af-b0ab-ca6907261cc9 uri = /v1/snapshots/demo-snapshot?project=demo-project
358752025-03-07T23:31:13.737ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 155 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9b10c927-8fea-42af-b0ab-ca6907261cc9 response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
358762025-03-07T23:31:13.737ZINFOtest_unauthorized (external client test context): client received response status = 401
358772025-03-07T23:31:13.737ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/snapshots/demo-snapshot?project=demo-project
358782025-03-07T23:31:13.737ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358792025-03-07T23:31:13.737ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7d3910b9-37b5-468a-9b9f-c512f4fd3d38 uri = /v1/snapshots/demo-snapshot?project=demo-project
358802025-03-07T23:31:13.738ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7d3910b9-37b5-468a-9b9f-c512f4fd3d38 uri = /v1/snapshots/demo-snapshot?project=demo-project
358812025-03-07T23:31:13.739ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4847:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Snapshot>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4865:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Snapshot>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseOk<nexus_types::external_api::views::Snapshot>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7d3910b9-37b5-468a-9b9f-c512f4fd3d38 uri = /v1/snapshots/demo-snapshot?project=demo-project
358822025-03-07T23:31:13.739ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1189 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 7d3910b9-37b5-468a-9b9f-c512f4fd3d38 response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
358832025-03-07T23:31:13.739ZINFOtest_unauthorized (external client test context): client received response status = 401
358842025-03-07T23:31:13.739ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
358852025-03-07T23:31:13.739ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358862025-03-07T23:31:13.739ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3b311ecb-7641-4ee8-91c9-40a35d0f60a4 uri = /v1/snapshots/demo-snapshot?project=demo-project
358872025-03-07T23:31:13.739ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 47 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 3b311ecb-7641-4ee8-91c9-40a35d0f60a4 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
358882025-03-07T23:31:13.739ZINFOtest_unauthorized (external client test context): client received response status = 405
358892025-03-07T23:31:13.739ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
358902025-03-07T23:31:13.739ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358912025-03-07T23:31:13.740ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5e9bdac9-f7b3-4e65-939b-2d9a9e152550 uri = /v1/snapshots/demo-snapshot?project=demo-project
358922025-03-07T23:31:13.740ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5e9bdac9-f7b3-4e65-939b-2d9a9e152550 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
358932025-03-07T23:31:13.740ZINFOtest_unauthorized (external client test context): client received response status = 405
358942025-03-07T23:31:13.740ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
358952025-03-07T23:31:13.740ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
358962025-03-07T23:31:13.740ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d2bf4419-248a-420e-a166-c78d96a83c17 uri = /v1/snapshots/demo-snapshot?project=demo-project
358972025-03-07T23:31:13.740ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d2bf4419-248a-420e-a166-c78d96a83c17 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
358982025-03-07T23:31:13.741ZINFOtest_unauthorized (external client test context): client received response status = 405
358992025-03-07T23:31:13.741ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/snapshots/demo-snapshot?project=demo-project
359002025-03-07T23:31:13.741ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359012025-03-07T23:31:13.742ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1940a296-8504-4112-ad23-1cbc861c8374 uri = /v1/snapshots/demo-snapshot?project=demo-project
359022025-03-07T23:31:13.742ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 96 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1940a296-8504-4112-ad23-1cbc861c8374 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
359032025-03-07T23:31:13.747ZINFOtest_unauthorized (external client test context): client received response status = 405
359042025-03-07T23:31:13.747ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
359052025-03-07T23:31:13.748ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359062025-03-07T23:31:13.748ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e3d10e79-ba2a-43bf-b52c-309237e99b2d uri = /v1/snapshots/demo-snapshot?project=demo-project
359072025-03-07T23:31:13.749ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 259 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = e3d10e79-ba2a-43bf-b52c-309237e99b2d response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
359082025-03-07T23:31:13.754ZINFOtest_unauthorized (external client test context): client received response status = 405
359092025-03-07T23:31:13.754ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
359102025-03-07T23:31:13.754ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359112025-03-07T23:31:13.756ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df1a6c41-642a-4b90-ace6-27e4c5317f0d uri = /v1/snapshots/demo-snapshot?project=demo-project
359122025-03-07T23:31:13.756ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 84 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = df1a6c41-642a-4b90-ace6-27e4c5317f0d response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
359132025-03-07T23:31:13.763ZINFOtest_unauthorized (external client test context): client received response status = 405
359142025-03-07T23:31:13.763ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
359152025-03-07T23:31:13.763ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359162025-03-07T23:31:13.764ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a1399c3c-b200-4e0d-8cf0-ef3a95966a19 uri = /v1/snapshots/demo-snapshot?project=demo-project
359172025-03-07T23:31:13.764ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 83 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a1399c3c-b200-4e0d-8cf0-ef3a95966a19 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
359182025-03-07T23:31:13.768ZINFOtest_unauthorized (external client test context): client received response status = 405
359192025-03-07T23:31:13.768ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/snapshots/demo-snapshot?project=demo-project
359202025-03-07T23:31:13.768ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359212025-03-07T23:31:13.770ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33a24747-a74a-49a5-9733-01fa89d7bafe uri = /v1/snapshots/demo-snapshot?project=demo-project
359222025-03-07T23:31:13.770ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 33a24747-a74a-49a5-9733-01fa89d7bafe response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
359232025-03-07T23:31:13.772ZINFOtest_unauthorized (external client test context): client received response status = 405
359242025-03-07T23:31:13.772ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
359252025-03-07T23:31:13.772ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359262025-03-07T23:31:13.772ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa uri = /v1/snapshots/demo-snapshot?project=demo-project
359272025-03-07T23:31:13.777ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa uri = /v1/snapshots/demo-snapshot?project=demo-project
359282025-03-07T23:31:13.777ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/snapshots/demo-snapshot?project=demo-project
359292025-03-07T23:31:13.777ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359302025-03-07T23:31:13.777ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359312025-03-07T23:31:13.778ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359322025-03-07T23:31:13.782ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359332025-03-07T23:31:13.782ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359342025-03-07T23:31:13.783ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359352025-03-07T23:31:13.785ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
359362025-03-07T23:31:13.785ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
359372025-03-07T23:31:13.785ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359382025-03-07T23:31:13.785ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359392025-03-07T23:31:13.786ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359402025-03-07T23:31:13.788ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
359412025-03-07T23:31:13.788ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359422025-03-07T23:31:13.788ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359432025-03-07T23:31:13.789ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359442025-03-07T23:31:13.792ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
359452025-03-07T23:31:13.797ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
359462025-03-07T23:31:13.797ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359472025-03-07T23:31:13.797ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359482025-03-07T23:31:13.798ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359492025-03-07T23:31:13.801ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
359502025-03-07T23:31:13.801ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
359512025-03-07T23:31:13.801ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359522025-03-07T23:31:13.802ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359532025-03-07T23:31:13.803ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359542025-03-07T23:31:13.807ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
359552025-03-07T23:31:13.807ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
359562025-03-07T23:31:13.808ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
359572025-03-07T23:31:13.811ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
359582025-03-07T23:31:13.813ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
359592025-03-07T23:31:13.823ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
359602025-03-07T23:31:13.823ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa uri = /v1/snapshots/demo-snapshot?project=demo-project
359612025-03-07T23:31:13.823ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
359622025-03-07T23:31:13.823ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359632025-03-07T23:31:13.824ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
359642025-03-07T23:31:13.829ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
359652025-03-07T23:31:13.829ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359662025-03-07T23:31:13.829ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
359672025-03-07T23:31:13.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
359682025-03-07T23:31:13.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359692025-03-07T23:31:13.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
359702025-03-07T23:31:13.836ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
359712025-03-07T23:31:13.836ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
359722025-03-07T23:31:13.836ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
359732025-03-07T23:31:13.836ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359742025-03-07T23:31:13.837ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
359752025-03-07T23:31:13.840ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
359762025-03-07T23:31:13.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
359772025-03-07T23:31:13.841ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359782025-03-07T23:31:13.841ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
359792025-03-07T23:31:13.844ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
359802025-03-07T23:31:13.844ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
359812025-03-07T23:31:13.844ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359822025-03-07T23:31:13.844ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
359832025-03-07T23:31:13.849ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
359842025-03-07T23:31:13.874ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } result = Err(ObjectNotFound { type_name: Snapshot, lookup_type: ByName("demo-snapshot") }) uri = /v1/snapshots/demo-snapshot?project=demo-project
359852025-03-07T23:31:13.874ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: snapshot with name "demo-snapshot" error_message_internal = not found: snapshot with name "demo-snapshot" latency_us = 102357 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9213e1a6-47cc-4746-a38e-934630fd5caa response_code = 404 uri = /v1/snapshots/demo-snapshot?project=demo-project
359862025-03-07T23:31:13.874ZINFOtest_unauthorized (external client test context): client received response status = 404
359872025-03-07T23:31:13.874ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
359882025-03-07T23:31:13.874ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359892025-03-07T23:31:13.874ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0dffb8aa-8777-4008-bea0-ae11e9f37a5c uri = /v1/snapshots/demo-snapshot?project=demo-project
359902025-03-07T23:31:13.875ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0dffb8aa-8777-4008-bea0-ae11e9f37a5c uri = /v1/snapshots/demo-snapshot?project=demo-project
359912025-03-07T23:31:13.875ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0dffb8aa-8777-4008-bea0-ae11e9f37a5c uri = /v1/snapshots/demo-snapshot?project=demo-project
359922025-03-07T23:31:13.875ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0dffb8aa-8777-4008-bea0-ae11e9f37a5c uri = /v1/snapshots/demo-snapshot?project=demo-project
359932025-03-07T23:31:13.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 585 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 0dffb8aa-8777-4008-bea0-ae11e9f37a5c response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
359942025-03-07T23:31:13.875ZINFOtest_unauthorized (external client test context): client received response status = 401
359952025-03-07T23:31:13.875ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
359962025-03-07T23:31:13.875ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
359972025-03-07T23:31:13.876ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10983c11-79c8-4f8c-87fd-c07b7cffbc41 uri = /v1/snapshots/demo-snapshot?project=demo-project
359982025-03-07T23:31:13.876ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10983c11-79c8-4f8c-87fd-c07b7cffbc41 uri = /v1/snapshots/demo-snapshot?project=demo-project
359992025-03-07T23:31:13.876ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10983c11-79c8-4f8c-87fd-c07b7cffbc41 uri = /v1/snapshots/demo-snapshot?project=demo-project
360002025-03-07T23:31:13.876ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 170 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 10983c11-79c8-4f8c-87fd-c07b7cffbc41 response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
360012025-03-07T23:31:13.876ZINFOtest_unauthorized (external client test context): client received response status = 401
360022025-03-07T23:31:13.876ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/snapshots/demo-snapshot?project=demo-project
360032025-03-07T23:31:13.876ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
360042025-03-07T23:31:13.876ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e1e935e1-b85c-40e1-a8b1-84d0b9ab80df uri = /v1/snapshots/demo-snapshot?project=demo-project
360052025-03-07T23:31:13.876ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e1e935e1-b85c-40e1-a8b1-84d0b9ab80df uri = /v1/snapshots/demo-snapshot?project=demo-project
360062025-03-07T23:31:13.878ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4876:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4893:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::snapshot_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::SnapshotPath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e1e935e1-b85c-40e1-a8b1-84d0b9ab80df uri = /v1/snapshots/demo-snapshot?project=demo-project
360072025-03-07T23:31:13.878ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1150 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e1e935e1-b85c-40e1-a8b1-84d0b9ab80df response_code = 401 uri = /v1/snapshots/demo-snapshot?project=demo-project
360082025-03-07T23:31:13.878ZINFOtest_unauthorized (external client test context): client received response status = 401
360092025-03-07T23:31:13.878ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
360102025-03-07T23:31:13.878ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
360112025-03-07T23:31:13.878ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b4f560ad-c75e-4624-b386-dffdbf9d0692 uri = /v1/snapshots/demo-snapshot?project=demo-project
360122025-03-07T23:31:13.878ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 652 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = b4f560ad-c75e-4624-b386-dffdbf9d0692 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
360132025-03-07T23:31:13.879ZINFOtest_unauthorized (external client test context): client received response status = 405
360142025-03-07T23:31:13.879ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
360152025-03-07T23:31:13.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
360162025-03-07T23:31:13.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a4893b62-980d-41fb-abe3-b475ecf24859 uri = /v1/snapshots/demo-snapshot?project=demo-project
360172025-03-07T23:31:13.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = a4893b62-980d-41fb-abe3-b475ecf24859 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
360182025-03-07T23:31:13.879ZINFOtest_unauthorized (external client test context): client received response status = 405
360192025-03-07T23:31:13.879ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
360202025-03-07T23:31:13.879ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
360212025-03-07T23:31:13.879ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 61c45366-7eb4-482d-8b12-eb93acd9c54d uri = /v1/snapshots/demo-snapshot?project=demo-project
360222025-03-07T23:31:13.879ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 61c45366-7eb4-482d-8b12-eb93acd9c54d response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
360232025-03-07T23:31:13.880ZINFOtest_unauthorized (external client test context): client received response status = 405
360242025-03-07T23:31:13.880ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/snapshots/demo-snapshot?project=demo-project
360252025-03-07T23:31:13.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
360262025-03-07T23:31:13.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 588e15b9-2499-4643-9cd4-89b143080ba7 uri = /v1/snapshots/demo-snapshot?project=demo-project
360272025-03-07T23:31:13.880ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 588e15b9-2499-4643-9cd4-89b143080ba7 response_code = 405 uri = /v1/snapshots/demo-snapshot?project=demo-project
360282025-03-07T23:31:13.880ZINFOtest_unauthorized (external client test context): client received response status = 405
360292025-03-07T23:31:13.880ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/snapshots/demo-snapshot?project=demo-project
360302025-03-07T23:31:13.880ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/snapshots/demo-snapshot?project=demo-project
360312025-03-07T23:31:13.880ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 uri = /v1/snapshots/demo-snapshot?project=demo-project
360322025-03-07T23:31:13.881ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 uri = /v1/snapshots/demo-snapshot?project=demo-project
360332025-03-07T23:31:13.881ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/snapshots/demo-snapshot?project=demo-project
360342025-03-07T23:31:13.881ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360352025-03-07T23:31:13.881ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360362025-03-07T23:31:13.882ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360372025-03-07T23:31:13.884ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360382025-03-07T23:31:13.884ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360392025-03-07T23:31:13.885ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360402025-03-07T23:31:13.887ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
360412025-03-07T23:31:13.887ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
360422025-03-07T23:31:13.887ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360432025-03-07T23:31:13.888ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360442025-03-07T23:31:13.888ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360452025-03-07T23:31:13.891ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
360462025-03-07T23:31:13.891ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360472025-03-07T23:31:13.891ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360482025-03-07T23:31:13.892ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360492025-03-07T23:31:13.902ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
360502025-03-07T23:31:13.909ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
360512025-03-07T23:31:13.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360522025-03-07T23:31:13.912ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360532025-03-07T23:31:13.913ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360542025-03-07T23:31:13.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
360552025-03-07T23:31:13.917ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
360562025-03-07T23:31:13.917ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360572025-03-07T23:31:13.917ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360582025-03-07T23:31:13.919ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360592025-03-07T23:31:13.924ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
360602025-03-07T23:31:13.931ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360612025-03-07T23:31:13.931ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
360622025-03-07T23:31:13.932ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
360632025-03-07T23:31:13.935ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
360642025-03-07T23:31:13.944ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
360652025-03-07T23:31:13.944ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 uri = /v1/snapshots/demo-snapshot?project=demo-project
360662025-03-07T23:31:13.944ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
360672025-03-07T23:31:13.944ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360682025-03-07T23:31:13.945ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360692025-03-07T23:31:13.949ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
360702025-03-07T23:31:13.949ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360712025-03-07T23:31:13.949ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360722025-03-07T23:31:13.951ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
360732025-03-07T23:31:13.951ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360742025-03-07T23:31:13.952ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360752025-03-07T23:31:13.957ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } uri = /v1/snapshots/demo-snapshot?project=demo-project
360762025-03-07T23:31:13.958ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/snapshots/demo-snapshot?project=demo-project
360772025-03-07T23:31:13.958ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
360782025-03-07T23:31:13.958ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360792025-03-07T23:31:13.959ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360802025-03-07T23:31:13.967ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/snapshots/demo-snapshot?project=demo-project
360812025-03-07T23:31:13.968ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
360822025-03-07T23:31:13.968ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360832025-03-07T23:31:13.968ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360842025-03-07T23:31:13.975ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/snapshots/demo-snapshot?project=demo-project
360852025-03-07T23:31:13.975ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database uri = /v1/snapshots/demo-snapshot?project=demo-project
360862025-03-07T23:31:13.975ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360872025-03-07T23:31:13.978ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Database result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360882025-03-07T23:31:13.981ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/snapshots/demo-snapshot?project=demo-project
360892025-03-07T23:31:14.001ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 resource = Snapshot { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 5491bbba-7e49-45a0-8b6b-907587ab9704, lookup_type: ByName("demo-snapshot") } result = Ok(()) uri = /v1/snapshots/demo-snapshot?project=demo-project
360902025-03-07T23:31:14.019ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 137618 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 33a99f87-f197-4908-8116-db7d34490a61 response_code = 200 uri = /v1/snapshots/demo-snapshot?project=demo-project
360912025-03-07T23:31:14.020ZINFOtest_unauthorized (external client test context): client received response status = 200
360922025-03-07T23:31:14.028ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances?project=demo-project
360932025-03-07T23:31:14.029ZINFOtest_unauthorized: test: privileged GET url = /v1/instances?project=demo-project
360942025-03-07T23:31:14.029ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances?project=demo-project
360952025-03-07T23:31:14.029ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 uri = /v1/instances?project=demo-project
360962025-03-07T23:31:14.029ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 uri = /v1/instances?project=demo-project
360972025-03-07T23:31:14.029ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
360982025-03-07T23:31:14.029ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
360992025-03-07T23:31:14.029ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361002025-03-07T23:31:14.029ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361012025-03-07T23:31:14.031ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361022025-03-07T23:31:14.031ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361032025-03-07T23:31:14.035ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361042025-03-07T23:31:14.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
361052025-03-07T23:31:14.040ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
361062025-03-07T23:31:14.040ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361072025-03-07T23:31:14.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361082025-03-07T23:31:14.044ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361092025-03-07T23:31:14.058ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
361102025-03-07T23:31:14.058ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361112025-03-07T23:31:14.058ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361122025-03-07T23:31:14.059ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361132025-03-07T23:31:14.065ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
361142025-03-07T23:31:14.074ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
361152025-03-07T23:31:14.075ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361162025-03-07T23:31:14.075ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361172025-03-07T23:31:14.075ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361182025-03-07T23:31:14.080ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
361192025-03-07T23:31:14.081ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
361202025-03-07T23:31:14.081ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361212025-03-07T23:31:14.081ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361222025-03-07T23:31:14.082ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361232025-03-07T23:31:14.087ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
361242025-03-07T23:31:14.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361252025-03-07T23:31:14.087ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361262025-03-07T23:31:14.091ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361272025-03-07T23:31:14.107ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
361282025-03-07T23:31:14.115ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
361292025-03-07T23:31:14.116ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 uri = /v1/instances?project=demo-project
361302025-03-07T23:31:14.116ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361312025-03-07T23:31:14.116ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361322025-03-07T23:31:14.116ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361332025-03-07T23:31:14.119ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361342025-03-07T23:31:14.119ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361352025-03-07T23:31:14.119ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361362025-03-07T23:31:14.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
361372025-03-07T23:31:14.121ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
361382025-03-07T23:31:14.121ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361392025-03-07T23:31:14.121ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361402025-03-07T23:31:14.123ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361412025-03-07T23:31:14.125ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
361422025-03-07T23:31:14.126ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361432025-03-07T23:31:14.126ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361442025-03-07T23:31:14.127ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361452025-03-07T23:31:14.136ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
361462025-03-07T23:31:14.136ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361472025-03-07T23:31:14.137ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361482025-03-07T23:31:14.137ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361492025-03-07T23:31:14.140ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
361502025-03-07T23:31:14.149ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
361512025-03-07T23:31:14.149ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
361522025-03-07T23:31:14.150ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
361532025-03-07T23:31:14.150ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361542025-03-07T23:31:14.150ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361552025-03-07T23:31:14.151ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361562025-03-07T23:31:14.164ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
361572025-03-07T23:31:14.165ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
361582025-03-07T23:31:14.171ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
361592025-03-07T23:31:14.172ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
361602025-03-07T23:31:14.172ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
361612025-03-07T23:31:14.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361622025-03-07T23:31:14.173ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361632025-03-07T23:31:14.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361642025-03-07T23:31:14.177ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
361652025-03-07T23:31:14.177ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
361662025-03-07T23:31:14.189ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
361672025-03-07T23:31:14.189ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361682025-03-07T23:31:14.189ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361692025-03-07T23:31:14.190ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361702025-03-07T23:31:14.190ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
361712025-03-07T23:31:14.190ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
361722025-03-07T23:31:14.197ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
361732025-03-07T23:31:14.213ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
361742025-03-07T23:31:14.213ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database uri = /v1/instances?project=demo-project
361752025-03-07T23:31:14.213ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
361762025-03-07T23:31:14.216ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
361772025-03-07T23:31:14.229ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 207359 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 6be5d280-a210-4ed9-9cb6-6b088cf8afa7 response_code = 200 uri = /v1/instances?project=demo-project
361782025-03-07T23:31:14.229ZINFOtest_unauthorized (external client test context): client received response status = 200
361792025-03-07T23:31:14.229ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances?project=demo-project
361802025-03-07T23:31:14.229ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances?project=demo-project
361812025-03-07T23:31:14.229ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 uri = /v1/instances?project=demo-project
361822025-03-07T23:31:14.234ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 uri = /v1/instances?project=demo-project
361832025-03-07T23:31:14.234ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances?project=demo-project
361842025-03-07T23:31:14.234ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361852025-03-07T23:31:14.234ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361862025-03-07T23:31:14.237ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361872025-03-07T23:31:14.241ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361882025-03-07T23:31:14.242ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361892025-03-07T23:31:14.243ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361902025-03-07T23:31:14.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
361912025-03-07T23:31:14.253ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
361922025-03-07T23:31:14.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361932025-03-07T23:31:14.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361942025-03-07T23:31:14.254ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361952025-03-07T23:31:14.258ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
361962025-03-07T23:31:14.261ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
361972025-03-07T23:31:14.262ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
361982025-03-07T23:31:14.263ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
361992025-03-07T23:31:14.267ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
362002025-03-07T23:31:14.282ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
362012025-03-07T23:31:14.282ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362022025-03-07T23:31:14.282ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362032025-03-07T23:31:14.283ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362042025-03-07T23:31:14.284ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
362052025-03-07T23:31:14.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
362062025-03-07T23:31:14.300ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
362072025-03-07T23:31:14.301ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362082025-03-07T23:31:14.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362092025-03-07T23:31:14.302ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362102025-03-07T23:31:14.306ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
362112025-03-07T23:31:14.306ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362122025-03-07T23:31:14.306ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362132025-03-07T23:31:14.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362142025-03-07T23:31:14.320ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
362152025-03-07T23:31:14.324ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
362162025-03-07T23:31:14.324ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 uri = /v1/instances?project=demo-project
362172025-03-07T23:31:14.324ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database uri = /v1/instances?project=demo-project
362182025-03-07T23:31:14.324ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
362192025-03-07T23:31:14.325ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
362202025-03-07T23:31:14.329ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database uri = /v1/instances?project=demo-project
362212025-03-07T23:31:14.329ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
362222025-03-07T23:31:14.331ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
362232025-03-07T23:31:14.336ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
362242025-03-07T23:31:14.336ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
362252025-03-07T23:31:14.337ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database uri = /v1/instances?project=demo-project
362262025-03-07T23:31:14.337ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
362272025-03-07T23:31:14.338ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
362282025-03-07T23:31:14.343ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
362292025-03-07T23:31:14.343ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database uri = /v1/instances?project=demo-project
362302025-03-07T23:31:14.343ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
362312025-03-07T23:31:14.344ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
362322025-03-07T23:31:14.348ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
362332025-03-07T23:31:14.348ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database uri = /v1/instances?project=demo-project
362342025-03-07T23:31:14.348ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
362352025-03-07T23:31:14.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
362362025-03-07T23:31:14.354ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
362372025-03-07T23:31:14.397ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/instances?project=demo-project
362382025-03-07T23:31:14.397ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 167703 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bec3f9d3-a562-4bc4-83fd-4436ed9e8073 response_code = 404 uri = /v1/instances?project=demo-project
362392025-03-07T23:31:14.398ZINFOtest_unauthorized (external client test context): client received response status = 404
362402025-03-07T23:31:14.398ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances?project=demo-project
362412025-03-07T23:31:14.398ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362422025-03-07T23:31:14.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf4808a7-e5f1-44cf-a429-12cbbe7050a6 uri = /v1/instances?project=demo-project
362432025-03-07T23:31:14.399ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf4808a7-e5f1-44cf-a429-12cbbe7050a6 uri = /v1/instances?project=demo-project
362442025-03-07T23:31:14.399ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf4808a7-e5f1-44cf-a429-12cbbe7050a6 uri = /v1/instances?project=demo-project
362452025-03-07T23:31:14.399ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf4808a7-e5f1-44cf-a429-12cbbe7050a6 uri = /v1/instances?project=demo-project
362462025-03-07T23:31:14.399ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 302 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bf4808a7-e5f1-44cf-a429-12cbbe7050a6 response_code = 401 uri = /v1/instances?project=demo-project
362472025-03-07T23:31:14.399ZINFOtest_unauthorized (external client test context): client received response status = 401
362482025-03-07T23:31:14.399ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances?project=demo-project
362492025-03-07T23:31:14.399ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362502025-03-07T23:31:14.399ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a04a8a4-d273-402d-a742-53ced7ec0fa6 uri = /v1/instances?project=demo-project
362512025-03-07T23:31:14.400ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a04a8a4-d273-402d-a742-53ced7ec0fa6 uri = /v1/instances?project=demo-project
362522025-03-07T23:31:14.400ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a04a8a4-d273-402d-a742-53ced7ec0fa6 uri = /v1/instances?project=demo-project
362532025-03-07T23:31:14.400ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 309 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 2a04a8a4-d273-402d-a742-53ced7ec0fa6 response_code = 401 uri = /v1/instances?project=demo-project
362542025-03-07T23:31:14.400ZINFOtest_unauthorized (external client test context): client received response status = 401
362552025-03-07T23:31:14.400ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances?project=demo-project
362562025-03-07T23:31:14.400ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362572025-03-07T23:31:14.400ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9882462c-1f37-4e40-b9ee-c2a2ce67d11b uri = /v1/instances?project=demo-project
362582025-03-07T23:31:14.400ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9882462c-1f37-4e40-b9ee-c2a2ce67d11b uri = /v1/instances?project=demo-project
362592025-03-07T23:31:14.402ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2045:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Instance>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2064:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Instance>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::ProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::Instance>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9882462c-1f37-4e40-b9ee-c2a2ce67d11b uri = /v1/instances?project=demo-project
362602025-03-07T23:31:14.402ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1558 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9882462c-1f37-4e40-b9ee-c2a2ce67d11b response_code = 401 uri = /v1/instances?project=demo-project
362612025-03-07T23:31:14.402ZINFOtest_unauthorized (external client test context): client received response status = 401
362622025-03-07T23:31:14.402ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances?project=demo-project
362632025-03-07T23:31:14.402ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362642025-03-07T23:31:14.403ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aea2baa9-85e2-44b5-97a6-50cb2b6c7389 uri = /v1/instances?project=demo-project
362652025-03-07T23:31:14.403ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 118 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = aea2baa9-85e2-44b5-97a6-50cb2b6c7389 response_code = 405 uri = /v1/instances?project=demo-project
362662025-03-07T23:31:14.403ZINFOtest_unauthorized (external client test context): client received response status = 405
362672025-03-07T23:31:14.403ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances?project=demo-project
362682025-03-07T23:31:14.403ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362692025-03-07T23:31:14.404ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d1274c8e-1bc7-4333-bfe6-a7ff66b86d19 uri = /v1/instances?project=demo-project
362702025-03-07T23:31:14.404ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = d1274c8e-1bc7-4333-bfe6-a7ff66b86d19 response_code = 405 uri = /v1/instances?project=demo-project
362712025-03-07T23:31:14.404ZINFOtest_unauthorized (external client test context): client received response status = 405
362722025-03-07T23:31:14.404ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances?project=demo-project
362732025-03-07T23:31:14.404ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362742025-03-07T23:31:14.404ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = db84401c-778a-4b70-baa0-44f1d4a5cc5b uri = /v1/instances?project=demo-project
362752025-03-07T23:31:14.404ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = db84401c-778a-4b70-baa0-44f1d4a5cc5b response_code = 405 uri = /v1/instances?project=demo-project
362762025-03-07T23:31:14.405ZINFOtest_unauthorized (external client test context): client received response status = 405
362772025-03-07T23:31:14.405ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances?project=demo-project
362782025-03-07T23:31:14.405ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362792025-03-07T23:31:14.405ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6b0983c-5713-4e88-88f6-be4c76332cb0 uri = /v1/instances?project=demo-project
362802025-03-07T23:31:14.405ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c6b0983c-5713-4e88-88f6-be4c76332cb0 response_code = 405 uri = /v1/instances?project=demo-project
362812025-03-07T23:31:14.407ZINFOtest_unauthorized (external client test context): client received response status = 405
362822025-03-07T23:31:14.407ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances?project=demo-project
362832025-03-07T23:31:14.407ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances?project=demo-project
362842025-03-07T23:31:14.407ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 uri = /v1/instances?project=demo-project
362852025-03-07T23:31:14.408ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 uri = /v1/instances?project=demo-project
362862025-03-07T23:31:14.408ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances?project=demo-project
362872025-03-07T23:31:14.408ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362882025-03-07T23:31:14.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362892025-03-07T23:31:14.409ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362902025-03-07T23:31:14.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362912025-03-07T23:31:14.412ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362922025-03-07T23:31:14.413ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362932025-03-07T23:31:14.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
362942025-03-07T23:31:14.416ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
362952025-03-07T23:31:14.416ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
362962025-03-07T23:31:14.416ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
362972025-03-07T23:31:14.420ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
362982025-03-07T23:31:14.425ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
362992025-03-07T23:31:14.425ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363002025-03-07T23:31:14.425ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363012025-03-07T23:31:14.426ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363022025-03-07T23:31:14.431ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
363032025-03-07T23:31:14.447ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
363042025-03-07T23:31:14.447ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363052025-03-07T23:31:14.447ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363062025-03-07T23:31:14.448ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363072025-03-07T23:31:14.453ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
363082025-03-07T23:31:14.453ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
363092025-03-07T23:31:14.453ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363102025-03-07T23:31:14.453ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363112025-03-07T23:31:14.454ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363122025-03-07T23:31:14.467ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
363132025-03-07T23:31:14.467ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
363142025-03-07T23:31:14.467ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
363152025-03-07T23:31:14.468ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
363162025-03-07T23:31:14.494ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
363172025-03-07T23:31:14.502ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
363182025-03-07T23:31:14.502ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 uri = /v1/instances?project=demo-project
363192025-03-07T23:31:14.502ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database uri = /v1/instances?project=demo-project
363202025-03-07T23:31:14.502ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
363212025-03-07T23:31:14.507ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
363222025-03-07T23:31:14.517ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database uri = /v1/instances?project=demo-project
363232025-03-07T23:31:14.517ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
363242025-03-07T23:31:14.518ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
363252025-03-07T23:31:14.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
363262025-03-07T23:31:14.521ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
363272025-03-07T23:31:14.521ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database uri = /v1/instances?project=demo-project
363282025-03-07T23:31:14.521ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
363292025-03-07T23:31:14.523ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
363302025-03-07T23:31:14.534ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
363312025-03-07T23:31:14.534ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database uri = /v1/instances?project=demo-project
363322025-03-07T23:31:14.535ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
363332025-03-07T23:31:14.537ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
363342025-03-07T23:31:14.547ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
363352025-03-07T23:31:14.547ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database uri = /v1/instances?project=demo-project
363362025-03-07T23:31:14.547ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
363372025-03-07T23:31:14.549ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
363382025-03-07T23:31:14.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
363392025-03-07T23:31:14.562ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
363402025-03-07T23:31:14.562ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
363412025-03-07T23:31:14.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Err(ObjectNotFound { type_name: Project, lookup_type: ByName("demo-project") }) uri = /v1/instances?project=demo-project
363422025-03-07T23:31:14.590ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: project with name "demo-project" error_message_internal = not found: project with name "demo-project" latency_us = 183061 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b3303665-1163-41b5-bd15-756549a61ef0 response_code = 404 uri = /v1/instances?project=demo-project
363432025-03-07T23:31:14.591ZINFOtest_unauthorized (external client test context): client received response status = 404
363442025-03-07T23:31:14.591ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances?project=demo-project
363452025-03-07T23:31:14.591ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363462025-03-07T23:31:14.592ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
363472025-03-07T23:31:14.592ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
363482025-03-07T23:31:14.593ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
363492025-03-07T23:31:14.593ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
363502025-03-07T23:31:14.593ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90c1b05d-2f10-4d89-807f-d0d4ebf63a28 uri = /v1/instances?project=demo-project
363512025-03-07T23:31:14.593ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90c1b05d-2f10-4d89-807f-d0d4ebf63a28 uri = /v1/instances?project=demo-project
363522025-03-07T23:31:14.593ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90c1b05d-2f10-4d89-807f-d0d4ebf63a28 uri = /v1/instances?project=demo-project
363532025-03-07T23:31:14.593ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90c1b05d-2f10-4d89-807f-d0d4ebf63a28 uri = /v1/instances?project=demo-project
363542025-03-07T23:31:14.594ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 832 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 90c1b05d-2f10-4d89-807f-d0d4ebf63a28 response_code = 401 uri = /v1/instances?project=demo-project
363552025-03-07T23:31:14.594ZINFOtest_unauthorized (external client test context): client received response status = 401
363562025-03-07T23:31:14.594ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances?project=demo-project
363572025-03-07T23:31:14.594ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363582025-03-07T23:31:14.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c6fb34c7-e930-4749-bbff-3544af6a9177 uri = /v1/instances?project=demo-project
363592025-03-07T23:31:14.594ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c6fb34c7-e930-4749-bbff-3544af6a9177 uri = /v1/instances?project=demo-project
363602025-03-07T23:31:14.594ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c6fb34c7-e930-4749-bbff-3544af6a9177 uri = /v1/instances?project=demo-project
363612025-03-07T23:31:14.594ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 530 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = c6fb34c7-e930-4749-bbff-3544af6a9177 response_code = 401 uri = /v1/instances?project=demo-project
363622025-03-07T23:31:14.595ZINFOtest_unauthorized (external client test context): client received response status = 401
363632025-03-07T23:31:14.595ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances?project=demo-project
363642025-03-07T23:31:14.595ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363652025-03-07T23:31:14.595ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aaafc097-6cfc-4d87-8e2e-87f9f457d7fc uri = /v1/instances?project=demo-project
363662025-03-07T23:31:14.596ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aaafc097-6cfc-4d87-8e2e-87f9f457d7fc uri = /v1/instances?project=demo-project
363672025-03-07T23:31:14.597ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2078:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2094:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::ProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aaafc097-6cfc-4d87-8e2e-87f9f457d7fc uri = /v1/instances?project=demo-project
363682025-03-07T23:31:14.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1622 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = aaafc097-6cfc-4d87-8e2e-87f9f457d7fc response_code = 401 uri = /v1/instances?project=demo-project
363692025-03-07T23:31:14.597ZINFOtest_unauthorized (external client test context): client received response status = 401
363702025-03-07T23:31:14.597ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances?project=demo-project
363712025-03-07T23:31:14.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363722025-03-07T23:31:14.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1981b415-074a-404d-af17-27739021c9e2 uri = /v1/instances?project=demo-project
363732025-03-07T23:31:14.598ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 49 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 1981b415-074a-404d-af17-27739021c9e2 response_code = 405 uri = /v1/instances?project=demo-project
363742025-03-07T23:31:14.598ZINFOtest_unauthorized (external client test context): client received response status = 405
363752025-03-07T23:31:14.598ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances?project=demo-project
363762025-03-07T23:31:14.598ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363772025-03-07T23:31:14.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23ab9d48-dc9e-4277-ace2-e18c6c990a15 uri = /v1/instances?project=demo-project
363782025-03-07T23:31:14.598ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 23ab9d48-dc9e-4277-ace2-e18c6c990a15 response_code = 405 uri = /v1/instances?project=demo-project
363792025-03-07T23:31:14.598ZINFOtest_unauthorized (external client test context): client received response status = 405
363802025-03-07T23:31:14.598ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances?project=demo-project
363812025-03-07T23:31:14.598ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363822025-03-07T23:31:14.599ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8b6f5d4b-4702-46eb-bbb6-9453e4d77015 uri = /v1/instances?project=demo-project
363832025-03-07T23:31:14.599ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 37 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 8b6f5d4b-4702-46eb-bbb6-9453e4d77015 response_code = 405 uri = /v1/instances?project=demo-project
363842025-03-07T23:31:14.599ZINFOtest_unauthorized (external client test context): client received response status = 405
363852025-03-07T23:31:14.599ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances?project=demo-project
363862025-03-07T23:31:14.599ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363872025-03-07T23:31:14.600ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5dda014b-b2a4-4be2-bd63-803c3b167081 uri = /v1/instances?project=demo-project
363882025-03-07T23:31:14.600ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 5dda014b-b2a4-4be2-bd63-803c3b167081 response_code = 405 uri = /v1/instances?project=demo-project
363892025-03-07T23:31:14.600ZINFOtest_unauthorized (external client test context): client received response status = 405
363902025-03-07T23:31:14.600ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances?project=demo-project
363912025-03-07T23:31:14.600ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363922025-03-07T23:31:14.601ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7233a8f3-8857-439e-8c21-720c5dcf39ec uri = /v1/instances?project=demo-project
363932025-03-07T23:31:14.602ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 7233a8f3-8857-439e-8c21-720c5dcf39ec response_code = 405 uri = /v1/instances?project=demo-project
363942025-03-07T23:31:14.602ZINFOtest_unauthorized (external client test context): client received response status = 405
363952025-03-07T23:31:14.602ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances?project=demo-project
363962025-03-07T23:31:14.602ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
363972025-03-07T23:31:14.602ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2f26ecca-5db0-45c3-bfb6-cb3be67de5ad uri = /v1/instances?project=demo-project
363982025-03-07T23:31:14.602ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2f26ecca-5db0-45c3-bfb6-cb3be67de5ad response_code = 405 uri = /v1/instances?project=demo-project
363992025-03-07T23:31:14.602ZINFOtest_unauthorized (external client test context): client received response status = 405
364002025-03-07T23:31:14.602ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances?project=demo-project
364012025-03-07T23:31:14.602ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
364022025-03-07T23:31:14.602ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 06a3ae20-cd48-4519-83ae-05865e641481 uri = /v1/instances?project=demo-project
364032025-03-07T23:31:14.603ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 06a3ae20-cd48-4519-83ae-05865e641481 response_code = 405 uri = /v1/instances?project=demo-project
364042025-03-07T23:31:14.603ZINFOtest_unauthorized (external client test context): client received response status = 405
364052025-03-07T23:31:14.603ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances?project=demo-project
364062025-03-07T23:31:14.603ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances?project=demo-project
364072025-03-07T23:31:14.603ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0633f3dd-b49e-4cf2-9813-665fd2d5d5f3 uri = /v1/instances?project=demo-project
364082025-03-07T23:31:14.603ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0633f3dd-b49e-4cf2-9813-665fd2d5d5f3 response_code = 405 uri = /v1/instances?project=demo-project
364092025-03-07T23:31:14.604ZINFOtest_unauthorized (external client test context): client received response status = 405
364102025-03-07T23:31:14.604ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances?project=demo-project
364112025-03-07T23:31:14.604ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances?project=demo-project
364122025-03-07T23:31:14.604ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 uri = /v1/instances?project=demo-project
364132025-03-07T23:31:14.604ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 uri = /v1/instances?project=demo-project
364142025-03-07T23:31:14.604ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=demo-project
364152025-03-07T23:31:14.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364162025-03-07T23:31:14.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364172025-03-07T23:31:14.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364182025-03-07T23:31:14.609ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364192025-03-07T23:31:14.611ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364202025-03-07T23:31:14.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364212025-03-07T23:31:14.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
364222025-03-07T23:31:14.616ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
364232025-03-07T23:31:14.616ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364242025-03-07T23:31:14.616ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364252025-03-07T23:31:14.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364262025-03-07T23:31:14.621ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
364272025-03-07T23:31:14.621ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364282025-03-07T23:31:14.621ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364292025-03-07T23:31:14.622ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364302025-03-07T23:31:14.623ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
364312025-03-07T23:31:14.631ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
364322025-03-07T23:31:14.631ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364332025-03-07T23:31:14.631ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364342025-03-07T23:31:14.634ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364352025-03-07T23:31:14.637ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
364362025-03-07T23:31:14.639ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
364372025-03-07T23:31:14.639ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364382025-03-07T23:31:14.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364392025-03-07T23:31:14.641ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364402025-03-07T23:31:14.646ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
364412025-03-07T23:31:14.646ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364422025-03-07T23:31:14.647ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364432025-03-07T23:31:14.648ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364442025-03-07T23:31:14.657ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
364452025-03-07T23:31:14.663ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
364462025-03-07T23:31:14.663ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 uri = /v1/instances?project=demo-project
364472025-03-07T23:31:14.663ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364482025-03-07T23:31:14.663ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364492025-03-07T23:31:14.665ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364502025-03-07T23:31:14.667ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364512025-03-07T23:31:14.667ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364522025-03-07T23:31:14.668ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364532025-03-07T23:31:14.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
364542025-03-07T23:31:14.671ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
364552025-03-07T23:31:14.671ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364562025-03-07T23:31:14.671ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364572025-03-07T23:31:14.672ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364582025-03-07T23:31:14.676ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
364592025-03-07T23:31:14.676ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364602025-03-07T23:31:14.676ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364612025-03-07T23:31:14.679ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364622025-03-07T23:31:14.682ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
364632025-03-07T23:31:14.682ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364642025-03-07T23:31:14.682ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364652025-03-07T23:31:14.683ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364662025-03-07T23:31:14.689ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
364672025-03-07T23:31:14.699ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
364682025-03-07T23:31:14.699ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } uri = /v1/instances?project=demo-project
364692025-03-07T23:31:14.699ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances?project=demo-project
364702025-03-07T23:31:14.699ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364712025-03-07T23:31:14.700ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364722025-03-07T23:31:14.700ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364732025-03-07T23:31:14.704ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=demo-project
364742025-03-07T23:31:14.704ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364752025-03-07T23:31:14.704ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364762025-03-07T23:31:14.704ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364772025-03-07T23:31:14.709ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=demo-project
364782025-03-07T23:31:14.709ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364792025-03-07T23:31:14.709ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364802025-03-07T23:31:14.709ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364812025-03-07T23:31:14.713ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=demo-project
364822025-03-07T23:31:14.720ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") } result = Ok(()) uri = /v1/instances?project=demo-project
364832025-03-07T23:31:14.720ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database uri = /v1/instances?project=demo-project
364842025-03-07T23:31:14.720ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 roles = RoleSet { roles: {} } uri = /v1/instances?project=demo-project
364852025-03-07T23:31:14.721ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 resource = Database result = Ok(()) uri = /v1/instances?project=demo-project
364862025-03-07T23:31:14.725ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 123492 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 9cb2cb42-6c1d-4842-9b8e-23993dcf66c5 response_code = 200 uri = /v1/instances?project=demo-project
364872025-03-07T23:31:14.726ZINFOtest_unauthorized (external client test context): client received response status = 200
364882025-03-07T23:31:14.726ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance?project=demo-project
364892025-03-07T23:31:14.726ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance?project=demo-project
364902025-03-07T23:31:14.726ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
364912025-03-07T23:31:14.726ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 uri = /v1/instances/demo-instance?project=demo-project
364922025-03-07T23:31:14.726ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 uri = /v1/instances/demo-instance?project=demo-project
364932025-03-07T23:31:14.726ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance?project=demo-project
364942025-03-07T23:31:14.727ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364952025-03-07T23:31:14.727ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364962025-03-07T23:31:14.727ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
364972025-03-07T23:31:14.729ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
364982025-03-07T23:31:14.729ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
364992025-03-07T23:31:14.730ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365002025-03-07T23:31:14.732ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
365012025-03-07T23:31:14.733ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
365022025-03-07T23:31:14.733ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365032025-03-07T23:31:14.733ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365042025-03-07T23:31:14.733ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365052025-03-07T23:31:14.736ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
365062025-03-07T23:31:14.736ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365072025-03-07T23:31:14.736ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365082025-03-07T23:31:14.736ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365092025-03-07T23:31:14.738ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
365102025-03-07T23:31:14.742ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
365112025-03-07T23:31:14.742ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365122025-03-07T23:31:14.742ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365132025-03-07T23:31:14.742ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365142025-03-07T23:31:14.748ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
365152025-03-07T23:31:14.748ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
365162025-03-07T23:31:14.748ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365172025-03-07T23:31:14.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365182025-03-07T23:31:14.749ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365192025-03-07T23:31:14.757ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
365202025-03-07T23:31:14.757ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365212025-03-07T23:31:14.757ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365222025-03-07T23:31:14.758ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365232025-03-07T23:31:14.769ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
365242025-03-07T23:31:14.773ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
365252025-03-07T23:31:14.773ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 uri = /v1/instances/demo-instance?project=demo-project
365262025-03-07T23:31:14.773ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365272025-03-07T23:31:14.773ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365282025-03-07T23:31:14.774ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365292025-03-07T23:31:14.778ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365302025-03-07T23:31:14.778ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365312025-03-07T23:31:14.778ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365322025-03-07T23:31:14.786ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365332025-03-07T23:31:14.786ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365342025-03-07T23:31:14.787ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365352025-03-07T23:31:14.790ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
365362025-03-07T23:31:14.792ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
365372025-03-07T23:31:14.792ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365382025-03-07T23:31:14.792ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365392025-03-07T23:31:14.793ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365402025-03-07T23:31:14.804ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
365412025-03-07T23:31:14.804ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365422025-03-07T23:31:14.805ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365432025-03-07T23:31:14.807ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365442025-03-07T23:31:14.812ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
365452025-03-07T23:31:14.812ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365462025-03-07T23:31:14.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365472025-03-07T23:31:14.813ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365482025-03-07T23:31:14.818ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
365492025-03-07T23:31:14.827ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365502025-03-07T23:31:14.827ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
365512025-03-07T23:31:14.828ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
365522025-03-07T23:31:14.828ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365532025-03-07T23:31:14.828ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365542025-03-07T23:31:14.828ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365552025-03-07T23:31:14.831ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
365562025-03-07T23:31:14.831ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365572025-03-07T23:31:14.831ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365582025-03-07T23:31:14.832ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365592025-03-07T23:31:14.835ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
365602025-03-07T23:31:14.835ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365612025-03-07T23:31:14.835ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365622025-03-07T23:31:14.836ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365632025-03-07T23:31:14.839ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
365642025-03-07T23:31:14.851ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365652025-03-07T23:31:14.851ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database uri = /v1/instances/demo-instance?project=demo-project
365662025-03-07T23:31:14.851ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
365672025-03-07T23:31:14.852ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
365682025-03-07T23:31:14.857ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 130920 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 503203ef-aeaa-4368-946f-441d142e65d1 response_code = 200 uri = /v1/instances/demo-instance?project=demo-project
365692025-03-07T23:31:14.858ZINFOtest_unauthorized (external client test context): client received response status = 200
365702025-03-07T23:31:14.858ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance?project=demo-project
365712025-03-07T23:31:14.858ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
365722025-03-07T23:31:14.858ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f uri = /v1/instances/demo-instance?project=demo-project
365732025-03-07T23:31:14.858ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f uri = /v1/instances/demo-instance?project=demo-project
365742025-03-07T23:31:14.858ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance?project=demo-project
365752025-03-07T23:31:14.858ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365762025-03-07T23:31:14.858ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365772025-03-07T23:31:14.859ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365782025-03-07T23:31:14.869ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365792025-03-07T23:31:14.869ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365802025-03-07T23:31:14.870ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365812025-03-07T23:31:14.877ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
365822025-03-07T23:31:14.878ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
365832025-03-07T23:31:14.878ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365842025-03-07T23:31:14.878ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365852025-03-07T23:31:14.880ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365862025-03-07T23:31:14.885ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
365872025-03-07T23:31:14.885ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365882025-03-07T23:31:14.885ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365892025-03-07T23:31:14.888ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365902025-03-07T23:31:14.892ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
365912025-03-07T23:31:14.900ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
365922025-03-07T23:31:14.900ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365932025-03-07T23:31:14.900ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365942025-03-07T23:31:14.901ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
365952025-03-07T23:31:14.906ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
365962025-03-07T23:31:14.907ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
365972025-03-07T23:31:14.907ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
365982025-03-07T23:31:14.907ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
365992025-03-07T23:31:14.909ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366002025-03-07T23:31:14.910ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
366012025-03-07T23:31:14.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366022025-03-07T23:31:14.912ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366032025-03-07T23:31:14.913ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366042025-03-07T23:31:14.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
366052025-03-07T23:31:14.922ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
366062025-03-07T23:31:14.922ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f uri = /v1/instances/demo-instance?project=demo-project
366072025-03-07T23:31:14.922ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database uri = /v1/instances/demo-instance?project=demo-project
366082025-03-07T23:31:14.922ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366092025-03-07T23:31:14.923ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366102025-03-07T23:31:14.925ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database uri = /v1/instances/demo-instance?project=demo-project
366112025-03-07T23:31:14.925ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366122025-03-07T23:31:14.926ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366132025-03-07T23:31:14.929ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database uri = /v1/instances/demo-instance?project=demo-project
366142025-03-07T23:31:14.929ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366152025-03-07T23:31:14.929ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366162025-03-07T23:31:14.932ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
366172025-03-07T23:31:14.932ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
366182025-03-07T23:31:14.932ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database uri = /v1/instances/demo-instance?project=demo-project
366192025-03-07T23:31:14.932ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366202025-03-07T23:31:14.933ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366212025-03-07T23:31:14.936ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
366222025-03-07T23:31:14.936ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database uri = /v1/instances/demo-instance?project=demo-project
366232025-03-07T23:31:14.936ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366242025-03-07T23:31:14.937ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366252025-03-07T23:31:14.941ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
366262025-03-07T23:31:14.941ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database uri = /v1/instances/demo-instance?project=demo-project
366272025-03-07T23:31:14.941ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366282025-03-07T23:31:14.942ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366292025-03-07T23:31:14.945ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366302025-03-07T23:31:14.960ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance?project=demo-project
366312025-03-07T23:31:14.961ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 102766 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b7f581cf-ded6-477b-bcca-e91dd0e7555f response_code = 404 uri = /v1/instances/demo-instance?project=demo-project
366322025-03-07T23:31:14.961ZINFOtest_unauthorized (external client test context): client received response status = 404
366332025-03-07T23:31:14.962ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance?project=demo-project
366342025-03-07T23:31:14.962ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
366352025-03-07T23:31:14.962ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 511fb068-9590-4632-b3bd-e40b07537641 uri = /v1/instances/demo-instance?project=demo-project
366362025-03-07T23:31:14.962ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 511fb068-9590-4632-b3bd-e40b07537641 uri = /v1/instances/demo-instance?project=demo-project
366372025-03-07T23:31:14.962ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 511fb068-9590-4632-b3bd-e40b07537641 uri = /v1/instances/demo-instance?project=demo-project
366382025-03-07T23:31:14.962ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 511fb068-9590-4632-b3bd-e40b07537641 uri = /v1/instances/demo-instance?project=demo-project
366392025-03-07T23:31:14.962ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 427 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 511fb068-9590-4632-b3bd-e40b07537641 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
366402025-03-07T23:31:14.963ZINFOtest_unauthorized (external client test context): client received response status = 401
366412025-03-07T23:31:14.963ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance?project=demo-project
366422025-03-07T23:31:14.963ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
366432025-03-07T23:31:14.963ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c37d97c6-055f-4d09-a125-dd72e7bae314 uri = /v1/instances/demo-instance?project=demo-project
366442025-03-07T23:31:14.963ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c37d97c6-055f-4d09-a125-dd72e7bae314 uri = /v1/instances/demo-instance?project=demo-project
366452025-03-07T23:31:14.963ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c37d97c6-055f-4d09-a125-dd72e7bae314 uri = /v1/instances/demo-instance?project=demo-project
366462025-03-07T23:31:14.963ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 177 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c37d97c6-055f-4d09-a125-dd72e7bae314 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
366472025-03-07T23:31:14.964ZINFOtest_unauthorized (external client test context): client received response status = 401
366482025-03-07T23:31:14.964ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance?project=demo-project
366492025-03-07T23:31:14.964ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
366502025-03-07T23:31:14.964ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4662246-3105-4112-ad19-734670a7d0f8 uri = /v1/instances/demo-instance?project=demo-project
366512025-03-07T23:31:14.964ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4662246-3105-4112-ad19-734670a7d0f8 uri = /v1/instances/demo-instance?project=demo-project
366522025-03-07T23:31:14.965ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2108:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2127:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_view::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4662246-3105-4112-ad19-734670a7d0f8 uri = /v1/instances/demo-instance?project=demo-project
366532025-03-07T23:31:14.966ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1254 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = e4662246-3105-4112-ad19-734670a7d0f8 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
366542025-03-07T23:31:14.966ZINFOtest_unauthorized (external client test context): client received response status = 401
366552025-03-07T23:31:14.966ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance?project=demo-project
366562025-03-07T23:31:14.966ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
366572025-03-07T23:31:14.966ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 uri = /v1/instances/demo-instance?project=demo-project
366582025-03-07T23:31:14.966ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 uri = /v1/instances/demo-instance?project=demo-project
366592025-03-07T23:31:14.966ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance?project=demo-project
366602025-03-07T23:31:14.966ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366612025-03-07T23:31:14.966ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366622025-03-07T23:31:14.967ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366632025-03-07T23:31:14.969ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366642025-03-07T23:31:14.969ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366652025-03-07T23:31:14.970ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366662025-03-07T23:31:14.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
366672025-03-07T23:31:14.973ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
366682025-03-07T23:31:14.973ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366692025-03-07T23:31:14.973ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366702025-03-07T23:31:14.974ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366712025-03-07T23:31:14.976ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
366722025-03-07T23:31:14.976ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366732025-03-07T23:31:14.976ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366742025-03-07T23:31:14.977ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366752025-03-07T23:31:14.980ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
366762025-03-07T23:31:14.984ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
366772025-03-07T23:31:14.984ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366782025-03-07T23:31:14.984ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366792025-03-07T23:31:14.985ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366802025-03-07T23:31:14.987ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
366812025-03-07T23:31:14.987ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
366822025-03-07T23:31:14.987ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366832025-03-07T23:31:14.987ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366842025-03-07T23:31:14.987ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366852025-03-07T23:31:14.990ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
366862025-03-07T23:31:14.990ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
366872025-03-07T23:31:14.990ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
366882025-03-07T23:31:14.990ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
366892025-03-07T23:31:14.992ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
366902025-03-07T23:31:14.996ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
366912025-03-07T23:31:14.996ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 uri = /v1/instances/demo-instance?project=demo-project
366922025-03-07T23:31:14.997ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database uri = /v1/instances/demo-instance?project=demo-project
366932025-03-07T23:31:14.997ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366942025-03-07T23:31:14.998ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366952025-03-07T23:31:15.002ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database uri = /v1/instances/demo-instance?project=demo-project
366962025-03-07T23:31:15.002ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
366972025-03-07T23:31:15.002ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
366982025-03-07T23:31:15.005ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database uri = /v1/instances/demo-instance?project=demo-project
366992025-03-07T23:31:15.005ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
367002025-03-07T23:31:15.006ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
367012025-03-07T23:31:15.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
367022025-03-07T23:31:15.008ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
367032025-03-07T23:31:15.008ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database uri = /v1/instances/demo-instance?project=demo-project
367042025-03-07T23:31:15.008ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
367052025-03-07T23:31:15.009ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
367062025-03-07T23:31:15.014ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
367072025-03-07T23:31:15.014ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database uri = /v1/instances/demo-instance?project=demo-project
367082025-03-07T23:31:15.014ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
367092025-03-07T23:31:15.014ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
367102025-03-07T23:31:15.018ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
367112025-03-07T23:31:15.018ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database uri = /v1/instances/demo-instance?project=demo-project
367122025-03-07T23:31:15.018ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
367132025-03-07T23:31:15.019ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
367142025-03-07T23:31:15.025ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
367152025-03-07T23:31:15.078ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance?project=demo-project
367162025-03-07T23:31:15.079ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 113041 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a630e936-3367-4ea5-bc0d-f5f1a7e07507 response_code = 404 uri = /v1/instances/demo-instance?project=demo-project
367172025-03-07T23:31:15.080ZINFOtest_unauthorized (external client test context): client received response status = 404
367182025-03-07T23:31:15.080ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance?project=demo-project
367192025-03-07T23:31:15.080ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367202025-03-07T23:31:15.082ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0cb682f1-a7fe-4bb7-913a-9b31ab27011a uri = /v1/instances/demo-instance?project=demo-project
367212025-03-07T23:31:15.083ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0cb682f1-a7fe-4bb7-913a-9b31ab27011a uri = /v1/instances/demo-instance?project=demo-project
367222025-03-07T23:31:15.083ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0cb682f1-a7fe-4bb7-913a-9b31ab27011a uri = /v1/instances/demo-instance?project=demo-project
367232025-03-07T23:31:15.083ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0cb682f1-a7fe-4bb7-913a-9b31ab27011a uri = /v1/instances/demo-instance?project=demo-project
367242025-03-07T23:31:15.083ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1424 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0cb682f1-a7fe-4bb7-913a-9b31ab27011a response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
367252025-03-07T23:31:15.112ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
367262025-03-07T23:31:15.112ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
367272025-03-07T23:31:15.112ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
367282025-03-07T23:31:15.112ZINFOtest_unauthorized (external client test context): client received response status = 401
367292025-03-07T23:31:15.113ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance?project=demo-project
367302025-03-07T23:31:15.113ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367312025-03-07T23:31:15.113ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ed45cd68-8cb6-44d0-9007-2f715b35ca8e uri = /v1/instances/demo-instance?project=demo-project
367322025-03-07T23:31:15.113ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ed45cd68-8cb6-44d0-9007-2f715b35ca8e uri = /v1/instances/demo-instance?project=demo-project
367332025-03-07T23:31:15.113ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ed45cd68-8cb6-44d0-9007-2f715b35ca8e uri = /v1/instances/demo-instance?project=demo-project
367342025-03-07T23:31:15.113ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 405 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ed45cd68-8cb6-44d0-9007-2f715b35ca8e response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
367352025-03-07T23:31:15.113ZINFOtest_unauthorized (external client test context): client received response status = 401
367362025-03-07T23:31:15.114ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance?project=demo-project
367372025-03-07T23:31:15.114ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367382025-03-07T23:31:15.114ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cfaae8bd-b500-4c7d-8ba1-1f80b7be4db5 uri = /v1/instances/demo-instance?project=demo-project
367392025-03-07T23:31:15.114ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cfaae8bd-b500-4c7d-8ba1-1f80b7be4db5 uri = /v1/instances/demo-instance?project=demo-project
367402025-03-07T23:31:15.118ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2175:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2191:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_update::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceUpdate>), dropshot::handler::HttpResponseOk<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cfaae8bd-b500-4c7d-8ba1-1f80b7be4db5 uri = /v1/instances/demo-instance?project=demo-project
367412025-03-07T23:31:15.118ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3471 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = cfaae8bd-b500-4c7d-8ba1-1f80b7be4db5 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
367422025-03-07T23:31:15.118ZINFOtest_unauthorized (external client test context): client received response status = 401
367432025-03-07T23:31:15.118ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance?project=demo-project
367442025-03-07T23:31:15.118ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367452025-03-07T23:31:15.118ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a255051-7ee4-4bd7-a057-2c599b51e145 uri = /v1/instances/demo-instance?project=demo-project
367462025-03-07T23:31:15.118ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 3a255051-7ee4-4bd7-a057-2c599b51e145 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
367472025-03-07T23:31:15.118ZINFOtest_unauthorized (external client test context): client received response status = 405
367482025-03-07T23:31:15.118ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance?project=demo-project
367492025-03-07T23:31:15.118ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367502025-03-07T23:31:15.119ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 68a50377-be6e-4c34-8408-c1ab90aa1682 uri = /v1/instances/demo-instance?project=demo-project
367512025-03-07T23:31:15.119ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 68a50377-be6e-4c34-8408-c1ab90aa1682 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
367522025-03-07T23:31:15.119ZINFOtest_unauthorized (external client test context): client received response status = 405
367532025-03-07T23:31:15.119ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance?project=demo-project
367542025-03-07T23:31:15.119ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367552025-03-07T23:31:15.119ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d05795ac-58e5-4f0b-a5b2-f4e5377a5056 uri = /v1/instances/demo-instance?project=demo-project
367562025-03-07T23:31:15.120ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 386 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d05795ac-58e5-4f0b-a5b2-f4e5377a5056 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
367572025-03-07T23:31:15.120ZINFOtest_unauthorized (external client test context): client received response status = 405
367582025-03-07T23:31:15.120ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance?project=demo-project
367592025-03-07T23:31:15.120ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367602025-03-07T23:31:15.121ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d8a4fcc7-922e-4fc1-8cbe-a7cf42f86c38 uri = /v1/instances/demo-instance?project=demo-project
367612025-03-07T23:31:15.121ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 110 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = d8a4fcc7-922e-4fc1-8cbe-a7cf42f86c38 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
367622025-03-07T23:31:15.121ZINFOtest_unauthorized (external client test context): client received response status = 405
367632025-03-07T23:31:15.122ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance?project=demo-project
367642025-03-07T23:31:15.122ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
367652025-03-07T23:31:15.122ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 uri = /v1/instances/demo-instance?project=demo-project
367662025-03-07T23:31:15.122ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 uri = /v1/instances/demo-instance?project=demo-project
367672025-03-07T23:31:15.122ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance?project=demo-project
367682025-03-07T23:31:15.122ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367692025-03-07T23:31:15.122ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367702025-03-07T23:31:15.123ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367712025-03-07T23:31:15.125ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367722025-03-07T23:31:15.125ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367732025-03-07T23:31:15.126ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367742025-03-07T23:31:15.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
367752025-03-07T23:31:15.128ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
367762025-03-07T23:31:15.129ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367772025-03-07T23:31:15.129ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367782025-03-07T23:31:15.132ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367792025-03-07T23:31:15.138ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
367802025-03-07T23:31:15.138ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367812025-03-07T23:31:15.138ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367822025-03-07T23:31:15.139ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367832025-03-07T23:31:15.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
367842025-03-07T23:31:15.155ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
367852025-03-07T23:31:15.155ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367862025-03-07T23:31:15.155ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367872025-03-07T23:31:15.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367882025-03-07T23:31:15.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
367892025-03-07T23:31:15.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
367902025-03-07T23:31:15.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
367912025-03-07T23:31:15.159ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
367922025-03-07T23:31:15.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
367932025-03-07T23:31:15.161ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
367942025-03-07T23:31:15.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
367952025-03-07T23:31:15.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
367962025-03-07T23:31:15.162ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
367972025-03-07T23:31:15.164ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
367982025-03-07T23:31:15.164ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
367992025-03-07T23:31:15.165ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
368002025-03-07T23:31:15.165ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368012025-03-07T23:31:15.165ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368022025-03-07T23:31:15.166ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368032025-03-07T23:31:15.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
368042025-03-07T23:31:15.171ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
368052025-03-07T23:31:15.172ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
368062025-03-07T23:31:15.183ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
368072025-03-07T23:31:15.183ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 uri = /v1/instances/demo-instance?project=demo-project
368082025-03-07T23:31:15.183ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database uri = /v1/instances/demo-instance?project=demo-project
368092025-03-07T23:31:15.183ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368102025-03-07T23:31:15.184ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
368112025-03-07T23:31:15.186ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database uri = /v1/instances/demo-instance?project=demo-project
368122025-03-07T23:31:15.186ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368132025-03-07T23:31:15.187ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
368142025-03-07T23:31:15.190ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database uri = /v1/instances/demo-instance?project=demo-project
368152025-03-07T23:31:15.190ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368162025-03-07T23:31:15.192ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
368172025-03-07T23:31:15.196ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
368182025-03-07T23:31:15.196ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
368192025-03-07T23:31:15.196ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database uri = /v1/instances/demo-instance?project=demo-project
368202025-03-07T23:31:15.196ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368212025-03-07T23:31:15.198ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
368222025-03-07T23:31:15.203ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
368232025-03-07T23:31:15.203ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database uri = /v1/instances/demo-instance?project=demo-project
368242025-03-07T23:31:15.203ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368252025-03-07T23:31:15.204ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
368262025-03-07T23:31:15.209ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
368272025-03-07T23:31:15.209ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database uri = /v1/instances/demo-instance?project=demo-project
368282025-03-07T23:31:15.209ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368292025-03-07T23:31:15.210ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
368302025-03-07T23:31:15.214ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
368312025-03-07T23:31:15.273ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance?project=demo-project
368322025-03-07T23:31:15.274ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 151831 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = a7ee2b35-3841-4509-8e8d-1809f2897006 response_code = 404 uri = /v1/instances/demo-instance?project=demo-project
368332025-03-07T23:31:15.275ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
368342025-03-07T23:31:15.275ZINFOtest_unauthorized (external client test context): client received response status = 404
368352025-03-07T23:31:15.276ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance?project=demo-project
368362025-03-07T23:31:15.276ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368372025-03-07T23:31:15.276ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f2bf0f03-f0f4-4807-87f6-03666d2a9e4b uri = /v1/instances/demo-instance?project=demo-project
368382025-03-07T23:31:15.277ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f2bf0f03-f0f4-4807-87f6-03666d2a9e4b uri = /v1/instances/demo-instance?project=demo-project
368392025-03-07T23:31:15.277ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f2bf0f03-f0f4-4807-87f6-03666d2a9e4b uri = /v1/instances/demo-instance?project=demo-project
368402025-03-07T23:31:15.277ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f2bf0f03-f0f4-4807-87f6-03666d2a9e4b uri = /v1/instances/demo-instance?project=demo-project
368412025-03-07T23:31:15.277ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 896 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = f2bf0f03-f0f4-4807-87f6-03666d2a9e4b response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
368422025-03-07T23:31:15.277ZINFOtest_unauthorized (external client test context): client received response status = 401
368432025-03-07T23:31:15.278ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance?project=demo-project
368442025-03-07T23:31:15.278ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368452025-03-07T23:31:15.278ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 609eb72c-feb5-4d0b-bbfd-9afe61848d4c uri = /v1/instances/demo-instance?project=demo-project
368462025-03-07T23:31:15.278ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 609eb72c-feb5-4d0b-bbfd-9afe61848d4c uri = /v1/instances/demo-instance?project=demo-project
368472025-03-07T23:31:15.279ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 609eb72c-feb5-4d0b-bbfd-9afe61848d4c uri = /v1/instances/demo-instance?project=demo-project
368482025-03-07T23:31:15.279ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 669 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 609eb72c-feb5-4d0b-bbfd-9afe61848d4c response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
368492025-03-07T23:31:15.279ZINFOtest_unauthorized (external client test context): client received response status = 401
368502025-03-07T23:31:15.279ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance?project=demo-project
368512025-03-07T23:31:15.280ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368522025-03-07T23:31:15.280ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 05ad2509-ea94-42aa-9c17-70627f3be956 uri = /v1/instances/demo-instance?project=demo-project
368532025-03-07T23:31:15.280ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 05ad2509-ea94-42aa-9c17-70627f3be956 uri = /v1/instances/demo-instance?project=demo-project
368542025-03-07T23:31:15.282ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2145:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2155:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_delete::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 05ad2509-ea94-42aa-9c17-70627f3be956 uri = /v1/instances/demo-instance?project=demo-project
368552025-03-07T23:31:15.283ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2758 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 05ad2509-ea94-42aa-9c17-70627f3be956 response_code = 401 uri = /v1/instances/demo-instance?project=demo-project
368562025-03-07T23:31:15.283ZINFOtest_unauthorized (external client test context): client received response status = 401
368572025-03-07T23:31:15.283ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance?project=demo-project
368582025-03-07T23:31:15.283ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368592025-03-07T23:31:15.284ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dc1c804d-d360-4545-a83d-bdd1bb46f376 uri = /v1/instances/demo-instance?project=demo-project
368602025-03-07T23:31:15.284ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 162 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = dc1c804d-d360-4545-a83d-bdd1bb46f376 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
368612025-03-07T23:31:15.284ZINFOtest_unauthorized (external client test context): client received response status = 405
368622025-03-07T23:31:15.284ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance?project=demo-project
368632025-03-07T23:31:15.285ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368642025-03-07T23:31:15.285ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9a2a3468-5fb6-4ad5-8d6e-b0e569ba239a uri = /v1/instances/demo-instance?project=demo-project
368652025-03-07T23:31:15.285ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 157 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 9a2a3468-5fb6-4ad5-8d6e-b0e569ba239a response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
368662025-03-07T23:31:15.286ZINFOtest_unauthorized (external client test context): client received response status = 405
368672025-03-07T23:31:15.286ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance?project=demo-project
368682025-03-07T23:31:15.286ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368692025-03-07T23:31:15.286ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 58a29a90-b541-4604-adfe-d3bcfc9e5e3d uri = /v1/instances/demo-instance?project=demo-project
368702025-03-07T23:31:15.286ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 58a29a90-b541-4604-adfe-d3bcfc9e5e3d response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
368712025-03-07T23:31:15.287ZINFOtest_unauthorized (external client test context): client received response status = 405
368722025-03-07T23:31:15.287ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance?project=demo-project
368732025-03-07T23:31:15.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368742025-03-07T23:31:15.287ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d90bede6-bb05-4774-aa1b-893f50be2ec0 uri = /v1/instances/demo-instance?project=demo-project
368752025-03-07T23:31:15.287ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = d90bede6-bb05-4774-aa1b-893f50be2ec0 response_code = 405 uri = /v1/instances/demo-instance?project=demo-project
368762025-03-07T23:31:15.287ZINFOtest_unauthorized (external client test context): client received response status = 405
368772025-03-07T23:31:15.287ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance?project=demo-project
368782025-03-07T23:31:15.287ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance?project=demo-project
368792025-03-07T23:31:15.288ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a uri = /v1/instances/demo-instance?project=demo-project
368802025-03-07T23:31:15.288ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a uri = /v1/instances/demo-instance?project=demo-project
368812025-03-07T23:31:15.288ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance?project=demo-project
368822025-03-07T23:31:15.288ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368832025-03-07T23:31:15.288ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368842025-03-07T23:31:15.289ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368852025-03-07T23:31:15.291ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368862025-03-07T23:31:15.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368872025-03-07T23:31:15.292ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368882025-03-07T23:31:15.294ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
368892025-03-07T23:31:15.295ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
368902025-03-07T23:31:15.295ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368912025-03-07T23:31:15.295ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368922025-03-07T23:31:15.296ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368932025-03-07T23:31:15.299ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
368942025-03-07T23:31:15.299ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
368952025-03-07T23:31:15.299ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
368962025-03-07T23:31:15.299ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
368972025-03-07T23:31:15.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
368982025-03-07T23:31:15.307ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
368992025-03-07T23:31:15.308ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369002025-03-07T23:31:15.308ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369012025-03-07T23:31:15.309ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369022025-03-07T23:31:15.313ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
369032025-03-07T23:31:15.313ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
369042025-03-07T23:31:15.313ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369052025-03-07T23:31:15.313ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369062025-03-07T23:31:15.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369072025-03-07T23:31:15.317ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
369082025-03-07T23:31:15.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
369092025-03-07T23:31:15.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
369102025-03-07T23:31:15.321ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
369112025-03-07T23:31:15.325ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
369122025-03-07T23:31:15.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
369132025-03-07T23:31:15.339ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a uri = /v1/instances/demo-instance?project=demo-project
369142025-03-07T23:31:15.340ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369152025-03-07T23:31:15.340ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369162025-03-07T23:31:15.343ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369172025-03-07T23:31:15.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369182025-03-07T23:31:15.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369192025-03-07T23:31:15.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369202025-03-07T23:31:15.349ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369212025-03-07T23:31:15.349ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369222025-03-07T23:31:15.349ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369232025-03-07T23:31:15.352ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
369242025-03-07T23:31:15.352ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
369252025-03-07T23:31:15.352ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369262025-03-07T23:31:15.353ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369272025-03-07T23:31:15.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369282025-03-07T23:31:15.358ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
369292025-03-07T23:31:15.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369302025-03-07T23:31:15.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369312025-03-07T23:31:15.359ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369322025-03-07T23:31:15.363ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
369332025-03-07T23:31:15.364ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369342025-03-07T23:31:15.364ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369352025-03-07T23:31:15.365ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369362025-03-07T23:31:15.370ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
369372025-03-07T23:31:15.386ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369382025-03-07T23:31:15.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance?project=demo-project
369392025-03-07T23:31:15.386ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance?project=demo-project
369402025-03-07T23:31:15.386ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369412025-03-07T23:31:15.386ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369422025-03-07T23:31:15.387ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369432025-03-07T23:31:15.393ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance?project=demo-project
369442025-03-07T23:31:15.393ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369452025-03-07T23:31:15.393ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369462025-03-07T23:31:15.393ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369472025-03-07T23:31:15.399ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance?project=demo-project
369482025-03-07T23:31:15.399ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369492025-03-07T23:31:15.399ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369502025-03-07T23:31:15.401ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369512025-03-07T23:31:15.404ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance?project=demo-project
369522025-03-07T23:31:15.420ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369532025-03-07T23:31:15.420ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database uri = /v1/instances/demo-instance?project=demo-project
369542025-03-07T23:31:15.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance?project=demo-project
369552025-03-07T23:31:15.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a resource = Database result = Ok(()) uri = /v1/instances/demo-instance?project=demo-project
369562025-03-07T23:31:15.425ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
369572025-03-07T23:31:15.428ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
369582025-03-07T23:31:15.433ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 145125 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 66c2692c-17bb-4ebc-b760-15ba326a028a response_code = 200 uri = /v1/instances/demo-instance?project=demo-project
369592025-03-07T23:31:15.436ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c22c6066-ec94-45ba-adda-bc5f6eb9c7aa uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
369602025-03-07T23:31:15.436ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c22c6066-ec94-45ba-adda-bc5f6eb9c7aa resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
369612025-03-07T23:31:15.436ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c22c6066-ec94-45ba-adda-bc5f6eb9c7aa roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
369622025-03-07T23:31:15.440ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c22c6066-ec94-45ba-adda-bc5f6eb9c7aa resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
369632025-03-07T23:31:15.441ZINFOtest_unauthorized (external client test context): client received response status = 200
369642025-03-07T23:31:15.441ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/start?project=demo-project
369652025-03-07T23:31:15.441ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/start?project=demo-project
369662025-03-07T23:31:15.441ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/start?project=demo-project
369672025-03-07T23:31:15.441ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
369682025-03-07T23:31:15.442ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f2625adf-cd29-4612-8544-d6f970bcd996 uri = /v1/instances/demo-instance/start?project=demo-project
369692025-03-07T23:31:15.442ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 78 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = f2625adf-cd29-4612-8544-d6f970bcd996 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
369702025-03-07T23:31:15.443ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7261 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = c22c6066-ec94-45ba-adda-bc5f6eb9c7aa response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
369712025-03-07T23:31:15.443ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c22c6066-ec94-45ba-adda-bc5f6eb9c7aa", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:15 GMT"} })
369722025-03-07T23:31:15.444ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
369732025-03-07T23:31:15.444ZINFOtest_unauthorized (external client test context): client received response status = 405
369742025-03-07T23:31:15.444ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/start?project=demo-project
369752025-03-07T23:31:15.444ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
369762025-03-07T23:31:15.444ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 9d980160-f7ff-4246-9b42-2279027e2c43 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
369772025-03-07T23:31:15.444ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
369782025-03-07T23:31:15.445ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 9d980160-f7ff-4246-9b42-2279027e2c43 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
369792025-03-07T23:31:15.445ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 9d980160-f7ff-4246-9b42-2279027e2c43 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
369802025-03-07T23:31:15.446ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 9d980160-f7ff-4246-9b42-2279027e2c43 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
369812025-03-07T23:31:15.446ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
369822025-03-07T23:31:15.446ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c9024d3e-27c8-4d5d-8678-fc6e486caa4a uri = /v1/instances/demo-instance/start?project=demo-project
369832025-03-07T23:31:15.446ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c9024d3e-27c8-4d5d-8678-fc6e486caa4a response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
369842025-03-07T23:31:15.447ZTRACtest_unauthorized (dropshot): incoming request local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = b79e09ec-0b1c-4d51-9bd8-ed5f7169a560 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
369852025-03-07T23:31:15.952ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:867 latency_us = 506025 local_addr = 127.0.0.1:52350 method = GET remote_addr = 127.0.0.1:51991 req_id = b79e09ec-0b1c-4d51-9bd8-ed5f7169a560 response_code = 200 uri = /2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
369862025-03-07T23:31:15.954ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
369872025-03-07T23:31:15.957ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
369882025-03-07T23:31:15.957ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
369892025-03-07T23:31:15.958ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 513970 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 9d980160-f7ff-4246-9b42-2279027e2c43 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
369902025-03-07T23:31:15.959ZINFOtest_unauthorized (external client test context): client received response status = 405
369912025-03-07T23:31:15.959ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/start?project=demo-project
369922025-03-07T23:31:15.959ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
369932025-03-07T23:31:15.960ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d980160-f7ff-4246-9b42-2279027e2c43", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:15 GMT"} })
369942025-03-07T23:31:15.960ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
369952025-03-07T23:31:15.960ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
369962025-03-07T23:31:15.960ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
369972025-03-07T23:31:15.963ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5e0beb6c-6782-415a-bbaf-f911934804dc uri = /v1/instances/demo-instance/start?project=demo-project
369982025-03-07T23:31:15.963ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 89 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 5e0beb6c-6782-415a-bbaf-f911934804dc response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
369992025-03-07T23:31:15.963ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370002025-03-07T23:31:15.964ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370012025-03-07T23:31:15.964ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370022025-03-07T23:31:15.964ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370032025-03-07T23:31:15.967ZINFOtest_unauthorized (external client test context): client received response status = 405
370042025-03-07T23:31:15.968ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/start?project=demo-project
370052025-03-07T23:31:15.968ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
370062025-03-07T23:31:15.974ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bab2a4b8-2da9-4196-bba0-119957c12aa0 uri = /v1/instances/demo-instance/start?project=demo-project
370072025-03-07T23:31:15.974ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 104 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = bab2a4b8-2da9-4196-bba0-119957c12aa0 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
370082025-03-07T23:31:15.980ZINFOtest_unauthorized (external client test context): client received response status = 405
370092025-03-07T23:31:15.980ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/start?project=demo-project
370102025-03-07T23:31:15.980ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
370112025-03-07T23:31:15.982ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ba4c1add-f80a-48de-938e-e9fa46744b54 uri = /v1/instances/demo-instance/start?project=demo-project
370122025-03-07T23:31:15.982ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ba4c1add-f80a-48de-938e-e9fa46744b54 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
370132025-03-07T23:31:15.985ZINFOtest_unauthorized (external client test context): client received response status = 405
370142025-03-07T23:31:15.986ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/start?project=demo-project
370152025-03-07T23:31:15.986ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
370162025-03-07T23:31:15.994ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = de33d7e4-e132-4409-a9b5-bf3203308d91 uri = /v1/instances/demo-instance/start?project=demo-project
370172025-03-07T23:31:15.994ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 103 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = de33d7e4-e132-4409-a9b5-bf3203308d91 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
370182025-03-07T23:31:15.999ZINFOtest_unauthorized (external client test context): client received response status = 405
370192025-03-07T23:31:15.999ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/start?project=demo-project
370202025-03-07T23:31:15.999ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
370212025-03-07T23:31:16.000ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ebd9d449-9114-4851-bef7-7cb3a533829e uri = /v1/instances/demo-instance/start?project=demo-project
370222025-03-07T23:31:16.000ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 91 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ebd9d449-9114-4851-bef7-7cb3a533829e response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
370232025-03-07T23:31:16.003ZINFOtest_unauthorized (external client test context): client received response status = 405
370242025-03-07T23:31:16.003ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/start?project=demo-project
370252025-03-07T23:31:16.003ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
370262025-03-07T23:31:16.006ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a0f02916-4453-42ab-a7c9-9e93aac41c3d uri = /v1/instances/demo-instance/start?project=demo-project
370272025-03-07T23:31:16.006ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 90 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = a0f02916-4453-42ab-a7c9-9e93aac41c3d response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
370282025-03-07T23:31:16.014ZINFOtest_unauthorized (external client test context): client received response status = 405
370292025-03-07T23:31:16.014ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/start?project=demo-project
370302025-03-07T23:31:16.014ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
370312025-03-07T23:31:16.014ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 uri = /v1/instances/demo-instance/start?project=demo-project
370322025-03-07T23:31:16.015ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 uri = /v1/instances/demo-instance/start?project=demo-project
370332025-03-07T23:31:16.015ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/start?project=demo-project
370342025-03-07T23:31:16.015ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370352025-03-07T23:31:16.015ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370362025-03-07T23:31:16.016ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370372025-03-07T23:31:16.632ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
370382025-03-07T23:31:16.632ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
370392025-03-07T23:31:16.632ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
370402025-03-07T23:31:16.632ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370412025-03-07T23:31:16.632ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370422025-03-07T23:31:16.633ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370432025-03-07T23:31:16.638ZDEBGtest_unauthorized (results-sink): inserting 343 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
370442025-03-07T23:31:16.638ZDEBGtest_unauthorized (results-sink-cluster): inserting 343 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
370452025-03-07T23:31:16.638ZDEBGtest_unauthorized (clickhouse-client): unrolling 343 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
370462025-03-07T23:31:17.057ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
370472025-03-07T23:31:17.057ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370482025-03-07T23:31:17.058ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370492025-03-07T23:31:17.058ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
370502025-03-07T23:31:17.059ZTRACtest_unauthorized (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
370512025-03-07T23:31:17.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
370522025-03-07T23:31:17.060ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
370532025-03-07T23:31:17.060ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370542025-03-07T23:31:17.060ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370552025-03-07T23:31:17.061ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370562025-03-07T23:31:17.065ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
370572025-03-07T23:31:17.065ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370582025-03-07T23:31:17.065ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370592025-03-07T23:31:17.066ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370602025-03-07T23:31:17.067ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = fields_ipaddr
370612025-03-07T23:31:17.067ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 686 sql = INSERT INTO oximeter.fields_string FORMAT Native
370622025-03-07T23:31:17.068ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370632025-03-07T23:31:17.069ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370642025-03-07T23:31:17.069ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370652025-03-07T23:31:17.069ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
370662025-03-07T23:31:17.072ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
370672025-03-07T23:31:17.077ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
370682025-03-07T23:31:17.077ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370692025-03-07T23:31:17.077ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370702025-03-07T23:31:17.078ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370712025-03-07T23:31:17.080ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 686 table_name = fields_string
370722025-03-07T23:31:17.081ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 342 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
370732025-03-07T23:31:17.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
370742025-03-07T23:31:17.087ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
370752025-03-07T23:31:17.087ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370762025-03-07T23:31:17.087ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370772025-03-07T23:31:17.088ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370782025-03-07T23:31:17.090ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 342 table_name = fields_u16
370792025-03-07T23:31:17.090ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 348 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
370802025-03-07T23:31:17.098ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
370812025-03-07T23:31:17.099ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
370822025-03-07T23:31:17.099ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
370832025-03-07T23:31:17.099ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
370842025-03-07T23:31:17.101ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 348 table_name = fields_uuid
370852025-03-07T23:31:17.101ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
370862025-03-07T23:31:17.107ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
370872025-03-07T23:31:17.111ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
370882025-03-07T23:31:17.111ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 uri = /v1/instances/demo-instance/start?project=demo-project
370892025-03-07T23:31:17.111ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
370902025-03-07T23:31:17.111ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
370912025-03-07T23:31:17.113ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
370922025-03-07T23:31:17.118ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
370932025-03-07T23:31:17.119ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
370942025-03-07T23:31:17.119ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
370952025-03-07T23:31:17.120ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_cumulativeu64
370962025-03-07T23:31:17.120ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 19 n_rows = 341 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
370972025-03-07T23:31:17.131ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
370982025-03-07T23:31:17.131ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
370992025-03-07T23:31:17.132ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
371002025-03-07T23:31:17.141ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
371012025-03-07T23:31:17.141ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
371022025-03-07T23:31:17.142ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
371032025-03-07T23:31:17.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/start?project=demo-project
371042025-03-07T23:31:17.146ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/start?project=demo-project
371052025-03-07T23:31:17.146ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
371062025-03-07T23:31:17.146ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
371072025-03-07T23:31:17.146ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
371082025-03-07T23:31:17.154ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/start?project=demo-project
371092025-03-07T23:31:17.154ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
371102025-03-07T23:31:17.155ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
371112025-03-07T23:31:17.155ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
371122025-03-07T23:31:17.156ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 341 table_name = measurements_histogramu64
371132025-03-07T23:31:17.157ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
371142025-03-07T23:31:17.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
371152025-03-07T23:31:17.159ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/start?project=demo-project
371162025-03-07T23:31:17.159ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database uri = /v1/instances/demo-instance/start?project=demo-project
371172025-03-07T23:31:17.159ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
371182025-03-07T23:31:17.160ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/start?project=demo-project
371192025-03-07T23:31:17.162ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
371202025-03-07T23:31:17.162ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
371212025-03-07T23:31:17.164ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
371222025-03-07T23:31:17.166ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
371232025-03-07T23:31:17.168ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
371242025-03-07T23:31:17.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/start?project=demo-project
371252025-03-07T23:31:17.205ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/start?project=demo-project
371262025-03-07T23:31:17.206ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 1191863 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b73964cb-aa96-4745-b24f-22f2c02c6de6 response_code = 404 uri = /v1/instances/demo-instance/start?project=demo-project
371272025-03-07T23:31:17.207ZINFOtest_unauthorized (external client test context): client received response status = 404
371282025-03-07T23:31:17.207ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/start?project=demo-project
371292025-03-07T23:31:17.207ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371302025-03-07T23:31:17.208ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = de3f4f40-e28a-4f33-a625-68178362460b uri = /v1/instances/demo-instance/start?project=demo-project
371312025-03-07T23:31:17.208ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = de3f4f40-e28a-4f33-a625-68178362460b uri = /v1/instances/demo-instance/start?project=demo-project
371322025-03-07T23:31:17.208ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = de3f4f40-e28a-4f33-a625-68178362460b uri = /v1/instances/demo-instance/start?project=demo-project
371332025-03-07T23:31:17.208ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = de3f4f40-e28a-4f33-a625-68178362460b uri = /v1/instances/demo-instance/start?project=demo-project
371342025-03-07T23:31:17.208ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 332 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = de3f4f40-e28a-4f33-a625-68178362460b response_code = 401 uri = /v1/instances/demo-instance/start?project=demo-project
371352025-03-07T23:31:17.208ZINFOtest_unauthorized (external client test context): client received response status = 401
371362025-03-07T23:31:17.209ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/start?project=demo-project
371372025-03-07T23:31:17.209ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371382025-03-07T23:31:17.209ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7618c97-92f3-432c-aa35-0b8854b4da10 uri = /v1/instances/demo-instance/start?project=demo-project
371392025-03-07T23:31:17.209ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7618c97-92f3-432c-aa35-0b8854b4da10 uri = /v1/instances/demo-instance/start?project=demo-project
371402025-03-07T23:31:17.209ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7618c97-92f3-432c-aa35-0b8854b4da10 uri = /v1/instances/demo-instance/start?project=demo-project
371412025-03-07T23:31:17.210ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 741 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7618c97-92f3-432c-aa35-0b8854b4da10 response_code = 401 uri = /v1/instances/demo-instance/start?project=demo-project
371422025-03-07T23:31:17.210ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
371432025-03-07T23:31:17.210ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
371442025-03-07T23:31:17.210ZINFOtest_unauthorized (external client test context): client received response status = 401
371452025-03-07T23:31:17.210ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/start?project=demo-project
371462025-03-07T23:31:17.210ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371472025-03-07T23:31:17.210ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5788f0c4-c645-4016-86d7-51d957d4f6fe uri = /v1/instances/demo-instance/start?project=demo-project
371482025-03-07T23:31:17.211ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5788f0c4-c645-4016-86d7-51d957d4f6fe uri = /v1/instances/demo-instance/start?project=demo-project
371492025-03-07T23:31:17.212ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2238:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2254:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_start::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5788f0c4-c645-4016-86d7-51d957d4f6fe uri = /v1/instances/demo-instance/start?project=demo-project
371502025-03-07T23:31:17.212ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1593 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5788f0c4-c645-4016-86d7-51d957d4f6fe response_code = 401 uri = /v1/instances/demo-instance/start?project=demo-project
371512025-03-07T23:31:17.212ZINFOtest_unauthorized (external client test context): client received response status = 401
371522025-03-07T23:31:17.213ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
371532025-03-07T23:31:17.213ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371542025-03-07T23:31:17.214ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e315185a-8388-4b84-9a38-1098b4c4dcc5 uri = /v1/instances/demo-instance/start?project=demo-project
371552025-03-07T23:31:17.214ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 72 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e315185a-8388-4b84-9a38-1098b4c4dcc5 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371562025-03-07T23:31:17.214ZINFOtest_unauthorized (external client test context): client received response status = 405
371572025-03-07T23:31:17.214ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
371582025-03-07T23:31:17.214ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371592025-03-07T23:31:17.214ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = efd3fe82-0f89-46ea-a029-934bf1b3d333 uri = /v1/instances/demo-instance/start?project=demo-project
371602025-03-07T23:31:17.215ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 62 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = efd3fe82-0f89-46ea-a029-934bf1b3d333 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371612025-03-07T23:31:17.215ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
371622025-03-07T23:31:17.215ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
371632025-03-07T23:31:17.215ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
371642025-03-07T23:31:17.215ZINFOtest_unauthorized (external client test context): client received response status = 405
371652025-03-07T23:31:17.215ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
371662025-03-07T23:31:17.215ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371672025-03-07T23:31:17.215ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2704c897-8cf8-41a0-9ace-d5300280bf45 uri = /v1/instances/demo-instance/start?project=demo-project
371682025-03-07T23:31:17.215ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 66 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 2704c897-8cf8-41a0-9ace-d5300280bf45 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371692025-03-07T23:31:17.216ZINFOtest_unauthorized (external client test context): client received response status = 405
371702025-03-07T23:31:17.216ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/start?project=demo-project
371712025-03-07T23:31:17.216ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371722025-03-07T23:31:17.216ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9af6b2a2-751c-4760-9cf3-0e7b43ea2ea5 uri = /v1/instances/demo-instance/start?project=demo-project
371732025-03-07T23:31:17.216ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 9af6b2a2-751c-4760-9cf3-0e7b43ea2ea5 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371742025-03-07T23:31:17.216ZINFOtest_unauthorized (external client test context): client received response status = 405
371752025-03-07T23:31:17.216ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
371762025-03-07T23:31:17.216ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371772025-03-07T23:31:17.217ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = af86e485-2399-487f-be41-0112ae921a84 uri = /v1/instances/demo-instance/start?project=demo-project
371782025-03-07T23:31:17.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = af86e485-2399-487f-be41-0112ae921a84 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371792025-03-07T23:31:17.217ZINFOtest_unauthorized (external client test context): client received response status = 405
371802025-03-07T23:31:17.217ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
371812025-03-07T23:31:17.217ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371822025-03-07T23:31:17.217ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 234ece0b-d4b3-446d-87ed-b0dd40fbe843 uri = /v1/instances/demo-instance/start?project=demo-project
371832025-03-07T23:31:17.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 234ece0b-d4b3-446d-87ed-b0dd40fbe843 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371842025-03-07T23:31:17.218ZINFOtest_unauthorized (external client test context): client received response status = 405
371852025-03-07T23:31:17.218ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
371862025-03-07T23:31:17.218ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371872025-03-07T23:31:17.218ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6ea1581b-e339-4472-863d-47e32d0fc70f uri = /v1/instances/demo-instance/start?project=demo-project
371882025-03-07T23:31:17.218ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6ea1581b-e339-4472-863d-47e32d0fc70f response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371892025-03-07T23:31:17.218ZINFOtest_unauthorized (external client test context): client received response status = 405
371902025-03-07T23:31:17.218ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/start?project=demo-project
371912025-03-07T23:31:17.218ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/start?project=demo-project
371922025-03-07T23:31:17.218ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f1d8e7a3-29b9-49ac-b5b7-0f556989c6b9 uri = /v1/instances/demo-instance/start?project=demo-project
371932025-03-07T23:31:17.218ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f1d8e7a3-29b9-49ac-b5b7-0f556989c6b9 response_code = 405 uri = /v1/instances/demo-instance/start?project=demo-project
371942025-03-07T23:31:17.218ZINFOtest_unauthorized (external client test context): client received response status = 405
371952025-03-07T23:31:17.218ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/start?project=demo-project
371962025-03-07T23:31:17.219ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/stop?project=demo-project
371972025-03-07T23:31:17.219ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/stop?project=demo-project
371982025-03-07T23:31:17.219ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/stop?project=demo-project
371992025-03-07T23:31:17.219ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372002025-03-07T23:31:17.219ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6d24ca7-7fad-4fa2-a51a-b84621f4537a uri = /v1/instances/demo-instance/stop?project=demo-project
372012025-03-07T23:31:17.219ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = c6d24ca7-7fad-4fa2-a51a-b84621f4537a response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372022025-03-07T23:31:17.219ZINFOtest_unauthorized (external client test context): client received response status = 405
372032025-03-07T23:31:17.219ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/stop?project=demo-project
372042025-03-07T23:31:17.219ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372052025-03-07T23:31:17.220ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd4b5076-3655-4222-abb4-5615bc4fc772 uri = /v1/instances/demo-instance/stop?project=demo-project
372062025-03-07T23:31:17.220ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 150 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = dd4b5076-3655-4222-abb4-5615bc4fc772 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372072025-03-07T23:31:17.220ZINFOtest_unauthorized (external client test context): client received response status = 405
372082025-03-07T23:31:17.220ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/stop?project=demo-project
372092025-03-07T23:31:17.220ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372102025-03-07T23:31:17.220ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0694d53d-9a08-49ef-8904-2934db04e3ae uri = /v1/instances/demo-instance/stop?project=demo-project
372112025-03-07T23:31:17.220ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 135 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 0694d53d-9a08-49ef-8904-2934db04e3ae response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372122025-03-07T23:31:17.221ZINFOtest_unauthorized (external client test context): client received response status = 405
372132025-03-07T23:31:17.221ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/stop?project=demo-project
372142025-03-07T23:31:17.221ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372152025-03-07T23:31:17.221ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44da2442-aa54-4a17-a75c-c12a0079e089 uri = /v1/instances/demo-instance/stop?project=demo-project
372162025-03-07T23:31:17.221ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 44da2442-aa54-4a17-a75c-c12a0079e089 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372172025-03-07T23:31:17.221ZINFOtest_unauthorized (external client test context): client received response status = 405
372182025-03-07T23:31:17.221ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
372192025-03-07T23:31:17.221ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372202025-03-07T23:31:17.221ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 622b9a43-7646-4d9a-835b-01a271b3f97a uri = /v1/instances/demo-instance/stop?project=demo-project
372212025-03-07T23:31:17.222ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 622b9a43-7646-4d9a-835b-01a271b3f97a response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372222025-03-07T23:31:17.222ZINFOtest_unauthorized (external client test context): client received response status = 405
372232025-03-07T23:31:17.222ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
372242025-03-07T23:31:17.222ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372252025-03-07T23:31:17.222ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0ca1cb95-7e92-4d34-9fda-003ab30dceed uri = /v1/instances/demo-instance/stop?project=demo-project
372262025-03-07T23:31:17.222ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 96 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 0ca1cb95-7e92-4d34-9fda-003ab30dceed response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372272025-03-07T23:31:17.222ZINFOtest_unauthorized (external client test context): client received response status = 405
372282025-03-07T23:31:17.223ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
372292025-03-07T23:31:17.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372302025-03-07T23:31:17.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6cf75b15-a947-4b31-b94e-9b6b0fc7e886 uri = /v1/instances/demo-instance/stop?project=demo-project
372312025-03-07T23:31:17.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 97 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 6cf75b15-a947-4b31-b94e-9b6b0fc7e886 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372322025-03-07T23:31:17.223ZINFOtest_unauthorized (external client test context): client received response status = 405
372332025-03-07T23:31:17.223ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/stop?project=demo-project
372342025-03-07T23:31:17.223ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372352025-03-07T23:31:17.223ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ac92faa6-501c-4f59-9cad-67aeb81d22ba uri = /v1/instances/demo-instance/stop?project=demo-project
372362025-03-07T23:31:17.223ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = ac92faa6-501c-4f59-9cad-67aeb81d22ba response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
372372025-03-07T23:31:17.224ZINFOtest_unauthorized (external client test context): client received response status = 405
372382025-03-07T23:31:17.224ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/stop?project=demo-project
372392025-03-07T23:31:17.224ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
372402025-03-07T23:31:17.224ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce uri = /v1/instances/demo-instance/stop?project=demo-project
372412025-03-07T23:31:17.224ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce uri = /v1/instances/demo-instance/stop?project=demo-project
372422025-03-07T23:31:17.224ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/stop?project=demo-project
372432025-03-07T23:31:17.224ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372442025-03-07T23:31:17.224ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372452025-03-07T23:31:17.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372462025-03-07T23:31:17.229ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372472025-03-07T23:31:17.229ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372482025-03-07T23:31:17.229ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372492025-03-07T23:31:17.231ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
372502025-03-07T23:31:17.232ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
372512025-03-07T23:31:17.232ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372522025-03-07T23:31:17.232ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372532025-03-07T23:31:17.233ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372542025-03-07T23:31:17.234ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
372552025-03-07T23:31:17.234ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372562025-03-07T23:31:17.234ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372572025-03-07T23:31:17.235ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372582025-03-07T23:31:17.237ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
372592025-03-07T23:31:17.241ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
372602025-03-07T23:31:17.242ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372612025-03-07T23:31:17.242ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372622025-03-07T23:31:17.242ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372632025-03-07T23:31:17.245ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
372642025-03-07T23:31:17.245ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
372652025-03-07T23:31:17.245ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372662025-03-07T23:31:17.246ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372672025-03-07T23:31:17.246ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372682025-03-07T23:31:17.248ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
372692025-03-07T23:31:17.248ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
372702025-03-07T23:31:17.248ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
372712025-03-07T23:31:17.249ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
372722025-03-07T23:31:17.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
372732025-03-07T23:31:17.259ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
372742025-03-07T23:31:17.259ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce uri = /v1/instances/demo-instance/stop?project=demo-project
372752025-03-07T23:31:17.259ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
372762025-03-07T23:31:17.259ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372772025-03-07T23:31:17.260ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
372782025-03-07T23:31:17.262ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
372792025-03-07T23:31:17.264ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
372802025-03-07T23:31:17.264ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372812025-03-07T23:31:17.264ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
372822025-03-07T23:31:17.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
372832025-03-07T23:31:17.267ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372842025-03-07T23:31:17.267ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
372852025-03-07T23:31:17.278ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/stop?project=demo-project
372862025-03-07T23:31:17.281ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/stop?project=demo-project
372872025-03-07T23:31:17.281ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
372882025-03-07T23:31:17.281ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372892025-03-07T23:31:17.281ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
372902025-03-07T23:31:17.301ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/stop?project=demo-project
372912025-03-07T23:31:17.301ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
372922025-03-07T23:31:17.301ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372932025-03-07T23:31:17.302ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
372942025-03-07T23:31:17.322ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/stop?project=demo-project
372952025-03-07T23:31:17.322ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database uri = /v1/instances/demo-instance/stop?project=demo-project
372962025-03-07T23:31:17.322ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372972025-03-07T23:31:17.323ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Database result = Ok(()) uri = /v1/instances/demo-instance/stop?project=demo-project
372982025-03-07T23:31:17.332ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/stop?project=demo-project
372992025-03-07T23:31:17.363ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/stop?project=demo-project
373002025-03-07T23:31:17.363ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 139362 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2f7d862c-c015-4901-971d-0456ef5961ce response_code = 404 uri = /v1/instances/demo-instance/stop?project=demo-project
373012025-03-07T23:31:17.364ZINFOtest_unauthorized (external client test context): client received response status = 404
373022025-03-07T23:31:17.364ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/stop?project=demo-project
373032025-03-07T23:31:17.364ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373042025-03-07T23:31:17.365ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 89f4047f-e961-46a3-94e5-9162a0232416 uri = /v1/instances/demo-instance/stop?project=demo-project
373052025-03-07T23:31:17.365ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 89f4047f-e961-46a3-94e5-9162a0232416 uri = /v1/instances/demo-instance/stop?project=demo-project
373062025-03-07T23:31:17.365ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 89f4047f-e961-46a3-94e5-9162a0232416 uri = /v1/instances/demo-instance/stop?project=demo-project
373072025-03-07T23:31:17.365ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 89f4047f-e961-46a3-94e5-9162a0232416 uri = /v1/instances/demo-instance/stop?project=demo-project
373082025-03-07T23:31:17.365ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 376 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 89f4047f-e961-46a3-94e5-9162a0232416 response_code = 401 uri = /v1/instances/demo-instance/stop?project=demo-project
373092025-03-07T23:31:17.365ZINFOtest_unauthorized (external client test context): client received response status = 401
373102025-03-07T23:31:17.365ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/stop?project=demo-project
373112025-03-07T23:31:17.365ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373122025-03-07T23:31:17.366ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 11f87655-923f-4ee3-ba7b-22bc3b1678d7 uri = /v1/instances/demo-instance/stop?project=demo-project
373132025-03-07T23:31:17.367ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 11f87655-923f-4ee3-ba7b-22bc3b1678d7 uri = /v1/instances/demo-instance/stop?project=demo-project
373142025-03-07T23:31:17.367ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 11f87655-923f-4ee3-ba7b-22bc3b1678d7 uri = /v1/instances/demo-instance/stop?project=demo-project
373152025-03-07T23:31:17.367ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 212 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 11f87655-923f-4ee3-ba7b-22bc3b1678d7 response_code = 401 uri = /v1/instances/demo-instance/stop?project=demo-project
373162025-03-07T23:31:17.367ZINFOtest_unauthorized (external client test context): client received response status = 401
373172025-03-07T23:31:17.367ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/stop?project=demo-project
373182025-03-07T23:31:17.367ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373192025-03-07T23:31:17.367ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 367b243b-8bbe-4046-8165-563e44ea89e0 uri = /v1/instances/demo-instance/stop?project=demo-project
373202025-03-07T23:31:17.367ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 367b243b-8bbe-4046-8165-563e44ea89e0 uri = /v1/instances/demo-instance/stop?project=demo-project
373212025-03-07T23:31:17.368ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2272:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2283:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_stop::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 367b243b-8bbe-4046-8165-563e44ea89e0 uri = /v1/instances/demo-instance/stop?project=demo-project
373222025-03-07T23:31:17.368ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1310 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 367b243b-8bbe-4046-8165-563e44ea89e0 response_code = 401 uri = /v1/instances/demo-instance/stop?project=demo-project
373232025-03-07T23:31:17.368ZINFOtest_unauthorized (external client test context): client received response status = 401
373242025-03-07T23:31:17.368ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
373252025-03-07T23:31:17.368ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373262025-03-07T23:31:17.368ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 838c811f-21fa-4b12-9524-aeb7640e60ef uri = /v1/instances/demo-instance/stop?project=demo-project
373272025-03-07T23:31:17.368ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 838c811f-21fa-4b12-9524-aeb7640e60ef response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373282025-03-07T23:31:17.369ZINFOtest_unauthorized (external client test context): client received response status = 405
373292025-03-07T23:31:17.369ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
373302025-03-07T23:31:17.369ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373312025-03-07T23:31:17.369ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e7e5c49a-0720-4a3c-8e73-3ab0c72631f6 uri = /v1/instances/demo-instance/stop?project=demo-project
373322025-03-07T23:31:17.370ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 136 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = e7e5c49a-0720-4a3c-8e73-3ab0c72631f6 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373332025-03-07T23:31:17.370ZINFOtest_unauthorized (external client test context): client received response status = 405
373342025-03-07T23:31:17.371ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
373352025-03-07T23:31:17.371ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373362025-03-07T23:31:17.371ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = aadf6919-f9b8-4741-89e5-49ef63c40375 uri = /v1/instances/demo-instance/stop?project=demo-project
373372025-03-07T23:31:17.371ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 43 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = aadf6919-f9b8-4741-89e5-49ef63c40375 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373382025-03-07T23:31:17.371ZINFOtest_unauthorized (external client test context): client received response status = 405
373392025-03-07T23:31:17.371ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/stop?project=demo-project
373402025-03-07T23:31:17.371ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373412025-03-07T23:31:17.371ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = af190d00-e400-4f3d-ad94-8b387e78aa1d uri = /v1/instances/demo-instance/stop?project=demo-project
373422025-03-07T23:31:17.372ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = af190d00-e400-4f3d-ad94-8b387e78aa1d response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373432025-03-07T23:31:17.372ZINFOtest_unauthorized (external client test context): client received response status = 405
373442025-03-07T23:31:17.372ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
373452025-03-07T23:31:17.372ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373462025-03-07T23:31:17.372ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 535f8ff8-5a9c-436f-bf6a-fd9dd78e2550 uri = /v1/instances/demo-instance/stop?project=demo-project
373472025-03-07T23:31:17.372ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 535f8ff8-5a9c-436f-bf6a-fd9dd78e2550 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373482025-03-07T23:31:17.372ZINFOtest_unauthorized (external client test context): client received response status = 405
373492025-03-07T23:31:17.372ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
373502025-03-07T23:31:17.372ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373512025-03-07T23:31:17.372ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 555ae0ce-fbf7-45e6-aec6-9da45124b23a uri = /v1/instances/demo-instance/stop?project=demo-project
373522025-03-07T23:31:17.372ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 555ae0ce-fbf7-45e6-aec6-9da45124b23a response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373532025-03-07T23:31:17.372ZINFOtest_unauthorized (external client test context): client received response status = 405
373542025-03-07T23:31:17.372ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
373552025-03-07T23:31:17.372ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373562025-03-07T23:31:17.372ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f5f5a2a1-5e0d-40b1-85f9-c4c5f556f5bf uri = /v1/instances/demo-instance/stop?project=demo-project
373572025-03-07T23:31:17.372ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f5f5a2a1-5e0d-40b1-85f9-c4c5f556f5bf response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373582025-03-07T23:31:17.373ZINFOtest_unauthorized (external client test context): client received response status = 405
373592025-03-07T23:31:17.373ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/stop?project=demo-project
373602025-03-07T23:31:17.373ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/stop?project=demo-project
373612025-03-07T23:31:17.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0974e5fd-0e74-4f17-a671-9e1647a103d4 uri = /v1/instances/demo-instance/stop?project=demo-project
373622025-03-07T23:31:17.375ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 92 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 0974e5fd-0e74-4f17-a671-9e1647a103d4 response_code = 405 uri = /v1/instances/demo-instance/stop?project=demo-project
373632025-03-07T23:31:17.375ZINFOtest_unauthorized (external client test context): client received response status = 405
373642025-03-07T23:31:17.375ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/stop?project=demo-project
373652025-03-07T23:31:17.375ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/reboot?project=demo-project
373662025-03-07T23:31:17.375ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/reboot?project=demo-project
373672025-03-07T23:31:17.375ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
373682025-03-07T23:31:17.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373692025-03-07T23:31:17.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 85ed2ea3-e865-4f49-90b1-1526c8f18dd4 uri = /v1/instances/demo-instance/reboot?project=demo-project
373702025-03-07T23:31:17.375ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 85ed2ea3-e865-4f49-90b1-1526c8f18dd4 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
373712025-03-07T23:31:17.375ZINFOtest_unauthorized (external client test context): client received response status = 405
373722025-03-07T23:31:17.375ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
373732025-03-07T23:31:17.375ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373742025-03-07T23:31:17.375ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcad379c-ecc5-45c5-be00-f988c0bf4bd1 uri = /v1/instances/demo-instance/reboot?project=demo-project
373752025-03-07T23:31:17.375ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 38 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = fcad379c-ecc5-45c5-be00-f988c0bf4bd1 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
373762025-03-07T23:31:17.376ZINFOtest_unauthorized (external client test context): client received response status = 405
373772025-03-07T23:31:17.376ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
373782025-03-07T23:31:17.376ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373792025-03-07T23:31:17.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0b16c87-a272-40d0-a216-5db9b77274d4 uri = /v1/instances/demo-instance/reboot?project=demo-project
373802025-03-07T23:31:17.376ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b0b16c87-a272-40d0-a216-5db9b77274d4 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
373812025-03-07T23:31:17.376ZINFOtest_unauthorized (external client test context): client received response status = 405
373822025-03-07T23:31:17.376ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/reboot?project=demo-project
373832025-03-07T23:31:17.376ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373842025-03-07T23:31:17.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = da5970bd-c494-40bc-9c91-9992e6b0ca26 uri = /v1/instances/demo-instance/reboot?project=demo-project
373852025-03-07T23:31:17.376ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = da5970bd-c494-40bc-9c91-9992e6b0ca26 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
373862025-03-07T23:31:17.376ZINFOtest_unauthorized (external client test context): client received response status = 405
373872025-03-07T23:31:17.376ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
373882025-03-07T23:31:17.376ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373892025-03-07T23:31:17.376ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5de09729-bad2-4cc1-9d2b-472436925ee7 uri = /v1/instances/demo-instance/reboot?project=demo-project
373902025-03-07T23:31:17.376ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 5de09729-bad2-4cc1-9d2b-472436925ee7 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
373912025-03-07T23:31:17.378ZINFOtest_unauthorized (external client test context): client received response status = 405
373922025-03-07T23:31:17.378ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
373932025-03-07T23:31:17.378ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373942025-03-07T23:31:17.378ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 74ff574b-95b4-4efa-be0b-4af157d07d02 uri = /v1/instances/demo-instance/reboot?project=demo-project
373952025-03-07T23:31:17.378ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 52 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 74ff574b-95b4-4efa-be0b-4af157d07d02 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
373962025-03-07T23:31:17.378ZINFOtest_unauthorized (external client test context): client received response status = 405
373972025-03-07T23:31:17.378ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
373982025-03-07T23:31:17.378ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
373992025-03-07T23:31:17.378ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 36aaf319-403a-451a-ae29-561d7251d8c0 uri = /v1/instances/demo-instance/reboot?project=demo-project
374002025-03-07T23:31:17.378ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 39 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 36aaf319-403a-451a-ae29-561d7251d8c0 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
374012025-03-07T23:31:17.379ZINFOtest_unauthorized (external client test context): client received response status = 405
374022025-03-07T23:31:17.379ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/reboot?project=demo-project
374032025-03-07T23:31:17.379ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
374042025-03-07T23:31:17.379ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1a5355ab-579b-40ef-94e9-27539949e377 uri = /v1/instances/demo-instance/reboot?project=demo-project
374052025-03-07T23:31:17.379ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1a5355ab-579b-40ef-94e9-27539949e377 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
374062025-03-07T23:31:17.379ZINFOtest_unauthorized (external client test context): client received response status = 405
374072025-03-07T23:31:17.379ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
374082025-03-07T23:31:17.380ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
374092025-03-07T23:31:17.380ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 uri = /v1/instances/demo-instance/reboot?project=demo-project
374102025-03-07T23:31:17.380ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 uri = /v1/instances/demo-instance/reboot?project=demo-project
374112025-03-07T23:31:17.380ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/reboot?project=demo-project
374122025-03-07T23:31:17.380ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374132025-03-07T23:31:17.380ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374142025-03-07T23:31:17.382ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374152025-03-07T23:31:17.384ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374162025-03-07T23:31:17.384ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374172025-03-07T23:31:17.385ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374182025-03-07T23:31:17.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
374192025-03-07T23:31:17.387ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
374202025-03-07T23:31:17.387ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374212025-03-07T23:31:17.387ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374222025-03-07T23:31:17.388ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374232025-03-07T23:31:17.390ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
374242025-03-07T23:31:17.390ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374252025-03-07T23:31:17.390ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374262025-03-07T23:31:17.391ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374272025-03-07T23:31:17.393ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
374282025-03-07T23:31:17.398ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
374292025-03-07T23:31:17.398ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374302025-03-07T23:31:17.398ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374312025-03-07T23:31:17.399ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374322025-03-07T23:31:17.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
374332025-03-07T23:31:17.402ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
374342025-03-07T23:31:17.402ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374352025-03-07T23:31:17.402ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374362025-03-07T23:31:17.403ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374372025-03-07T23:31:17.405ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
374382025-03-07T23:31:17.405ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
374392025-03-07T23:31:17.405ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
374402025-03-07T23:31:17.405ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
374412025-03-07T23:31:17.408ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
374422025-03-07T23:31:17.414ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
374432025-03-07T23:31:17.414ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 uri = /v1/instances/demo-instance/reboot?project=demo-project
374442025-03-07T23:31:17.415ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
374452025-03-07T23:31:17.415ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374462025-03-07T23:31:17.416ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
374472025-03-07T23:31:17.419ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
374482025-03-07T23:31:17.419ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
374492025-03-07T23:31:17.419ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = cb96f043-9244-4b19-bcf9-730d43431c10 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
374502025-03-07T23:31:17.419ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = cb96f043-9244-4b19-bcf9-730d43431c10 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
374512025-03-07T23:31:17.419ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = cb96f043-9244-4b19-bcf9-730d43431c10 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
374522025-03-07T23:31:17.421ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = cb96f043-9244-4b19-bcf9-730d43431c10 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
374532025-03-07T23:31:17.421ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
374542025-03-07T23:31:17.421ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374552025-03-07T23:31:17.421ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
374562025-03-07T23:31:17.425ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7393 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = cb96f043-9244-4b19-bcf9-730d43431c10 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
374572025-03-07T23:31:17.426ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb96f043-9244-4b19-bcf9-730d43431c10", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:17 GMT"} })
374582025-03-07T23:31:17.426ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
374592025-03-07T23:31:17.427ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
374602025-03-07T23:31:17.427ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374612025-03-07T23:31:17.429ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
374622025-03-07T23:31:17.429ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 051ed41b-c1da-415f-974b-4704ac9d4508 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
374632025-03-07T23:31:17.430ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 051ed41b-c1da-415f-974b-4704ac9d4508 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
374642025-03-07T23:31:17.430ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 051ed41b-c1da-415f-974b-4704ac9d4508 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
374652025-03-07T23:31:17.430ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 051ed41b-c1da-415f-974b-4704ac9d4508 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
374662025-03-07T23:31:17.435ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/reboot?project=demo-project
374672025-03-07T23:31:17.435ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/reboot?project=demo-project
374682025-03-07T23:31:17.435ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
374692025-03-07T23:31:17.435ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374702025-03-07T23:31:17.436ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
374712025-03-07T23:31:17.436ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 7216 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 051ed41b-c1da-415f-974b-4704ac9d4508 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
374722025-03-07T23:31:17.437ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "051ed41b-c1da-415f-974b-4704ac9d4508", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:17 GMT"} })
374732025-03-07T23:31:17.437ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
374742025-03-07T23:31:17.437ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
374752025-03-07T23:31:17.437ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
374762025-03-07T23:31:17.439ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/reboot?project=demo-project
374772025-03-07T23:31:17.439ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
374782025-03-07T23:31:17.439ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374792025-03-07T23:31:17.440ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
374802025-03-07T23:31:17.444ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/reboot?project=demo-project
374812025-03-07T23:31:17.444ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database uri = /v1/instances/demo-instance/reboot?project=demo-project
374822025-03-07T23:31:17.444ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374832025-03-07T23:31:17.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/reboot?project=demo-project
374842025-03-07T23:31:17.448ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/reboot?project=demo-project
374852025-03-07T23:31:17.483ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/reboot?project=demo-project
374862025-03-07T23:31:17.488ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 107870 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = f7db8419-60ac-4512-aaf0-aa24813bb2e5 response_code = 404 uri = /v1/instances/demo-instance/reboot?project=demo-project
374872025-03-07T23:31:17.489ZINFOtest_unauthorized (external client test context): client received response status = 404
374882025-03-07T23:31:17.489ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
374892025-03-07T23:31:17.489ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
374902025-03-07T23:31:17.489ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dad705f-765f-45e6-923a-947d99811c52 uri = /v1/instances/demo-instance/reboot?project=demo-project
374912025-03-07T23:31:17.489ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dad705f-765f-45e6-923a-947d99811c52 uri = /v1/instances/demo-instance/reboot?project=demo-project
374922025-03-07T23:31:17.490ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dad705f-765f-45e6-923a-947d99811c52 uri = /v1/instances/demo-instance/reboot?project=demo-project
374932025-03-07T23:31:17.490ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dad705f-765f-45e6-923a-947d99811c52 uri = /v1/instances/demo-instance/reboot?project=demo-project
374942025-03-07T23:31:17.490ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 345 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 2dad705f-765f-45e6-923a-947d99811c52 response_code = 401 uri = /v1/instances/demo-instance/reboot?project=demo-project
374952025-03-07T23:31:17.490ZINFOtest_unauthorized (external client test context): client received response status = 401
374962025-03-07T23:31:17.490ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
374972025-03-07T23:31:17.490ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
374982025-03-07T23:31:17.490ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32b9c3f3-ec54-4c5e-9b6b-0dc3108f2c2f uri = /v1/instances/demo-instance/reboot?project=demo-project
374992025-03-07T23:31:17.490ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32b9c3f3-ec54-4c5e-9b6b-0dc3108f2c2f uri = /v1/instances/demo-instance/reboot?project=demo-project
375002025-03-07T23:31:17.490ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32b9c3f3-ec54-4c5e-9b6b-0dc3108f2c2f uri = /v1/instances/demo-instance/reboot?project=demo-project
375012025-03-07T23:31:17.491ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 1017 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 32b9c3f3-ec54-4c5e-9b6b-0dc3108f2c2f response_code = 401 uri = /v1/instances/demo-instance/reboot?project=demo-project
375022025-03-07T23:31:17.491ZINFOtest_unauthorized (external client test context): client received response status = 401
375032025-03-07T23:31:17.491ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/reboot?project=demo-project
375042025-03-07T23:31:17.491ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375052025-03-07T23:31:17.492ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 140f75fa-2623-4e1e-8385-5eaf2da3760f uri = /v1/instances/demo-instance/reboot?project=demo-project
375062025-03-07T23:31:17.492ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 140f75fa-2623-4e1e-8385-5eaf2da3760f uri = /v1/instances/demo-instance/reboot?project=demo-project
375072025-03-07T23:31:17.493ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2209:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2220:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_reboot::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseAccepted<omicron_common::api::external::Instance>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 140f75fa-2623-4e1e-8385-5eaf2da3760f uri = /v1/instances/demo-instance/reboot?project=demo-project
375082025-03-07T23:31:17.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1189 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 140f75fa-2623-4e1e-8385-5eaf2da3760f response_code = 401 uri = /v1/instances/demo-instance/reboot?project=demo-project
375092025-03-07T23:31:17.493ZINFOtest_unauthorized (external client test context): client received response status = 401
375102025-03-07T23:31:17.493ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
375112025-03-07T23:31:17.493ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375122025-03-07T23:31:17.493ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 524a5ac4-0fcb-4a64-b89f-a4a684fb9aa7 uri = /v1/instances/demo-instance/reboot?project=demo-project
375132025-03-07T23:31:17.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 48 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 524a5ac4-0fcb-4a64-b89f-a4a684fb9aa7 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375142025-03-07T23:31:17.494ZINFOtest_unauthorized (external client test context): client received response status = 405
375152025-03-07T23:31:17.497ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
375162025-03-07T23:31:17.497ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375172025-03-07T23:31:17.497ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ca6b21c5-8e47-4ff7-8b1d-e97de6497897 uri = /v1/instances/demo-instance/reboot?project=demo-project
375182025-03-07T23:31:17.498ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 796 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = ca6b21c5-8e47-4ff7-8b1d-e97de6497897 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375192025-03-07T23:31:17.498ZINFOtest_unauthorized (external client test context): client received response status = 405
375202025-03-07T23:31:17.498ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
375212025-03-07T23:31:17.498ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375222025-03-07T23:31:17.498ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cf76ad5c-d16f-41f4-b8aa-2562dbe716db uri = /v1/instances/demo-instance/reboot?project=demo-project
375232025-03-07T23:31:17.498ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = cf76ad5c-d16f-41f4-b8aa-2562dbe716db response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375242025-03-07T23:31:17.499ZINFOtest_unauthorized (external client test context): client received response status = 405
375252025-03-07T23:31:17.499ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/reboot?project=demo-project
375262025-03-07T23:31:17.499ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375272025-03-07T23:31:17.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 690a71aa-62c9-4f29-b9b7-8a6717956604 uri = /v1/instances/demo-instance/reboot?project=demo-project
375282025-03-07T23:31:17.499ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 690a71aa-62c9-4f29-b9b7-8a6717956604 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375292025-03-07T23:31:17.499ZINFOtest_unauthorized (external client test context): client received response status = 405
375302025-03-07T23:31:17.499ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
375312025-03-07T23:31:17.499ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375322025-03-07T23:31:17.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6fb222b6-ebae-492f-ad4d-255c3753e2da uri = /v1/instances/demo-instance/reboot?project=demo-project
375332025-03-07T23:31:17.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 6fb222b6-ebae-492f-ad4d-255c3753e2da response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375342025-03-07T23:31:17.501ZINFOtest_unauthorized (external client test context): client received response status = 405
375352025-03-07T23:31:17.501ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
375362025-03-07T23:31:17.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375372025-03-07T23:31:17.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3ec9bfee-a5b7-42fd-bd03-6b038279935c uri = /v1/instances/demo-instance/reboot?project=demo-project
375382025-03-07T23:31:17.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 3ec9bfee-a5b7-42fd-bd03-6b038279935c response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375392025-03-07T23:31:17.501ZINFOtest_unauthorized (external client test context): client received response status = 405
375402025-03-07T23:31:17.501ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
375412025-03-07T23:31:17.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375422025-03-07T23:31:17.502ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 07c0d8e2-c560-433a-bb9a-633d95d3b5b8 uri = /v1/instances/demo-instance/reboot?project=demo-project
375432025-03-07T23:31:17.502ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 07c0d8e2-c560-433a-bb9a-633d95d3b5b8 response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375442025-03-07T23:31:17.502ZINFOtest_unauthorized (external client test context): client received response status = 405
375452025-03-07T23:31:17.502ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/reboot?project=demo-project
375462025-03-07T23:31:17.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/reboot?project=demo-project
375472025-03-07T23:31:17.502ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 35f3060f-08fd-48d7-8d9d-be1f13bfe1bc uri = /v1/instances/demo-instance/reboot?project=demo-project
375482025-03-07T23:31:17.502ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 35f3060f-08fd-48d7-8d9d-be1f13bfe1bc response_code = 405 uri = /v1/instances/demo-instance/reboot?project=demo-project
375492025-03-07T23:31:17.502ZINFOtest_unauthorized (external client test context): client received response status = 405
375502025-03-07T23:31:17.502ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/reboot?project=demo-project
375512025-03-07T23:31:17.502ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/serial-console?project=demo-project
375522025-03-07T23:31:17.502ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/serial-console?project=demo-project
375532025-03-07T23:31:17.502ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
375542025-03-07T23:31:17.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
375552025-03-07T23:31:17.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 uri = /v1/instances/demo-instance/serial-console?project=demo-project
375562025-03-07T23:31:17.503ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 uri = /v1/instances/demo-instance/serial-console?project=demo-project
375572025-03-07T23:31:17.503ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/serial-console?project=demo-project
375582025-03-07T23:31:17.504ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375592025-03-07T23:31:17.504ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375602025-03-07T23:31:17.505ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375612025-03-07T23:31:17.508ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375622025-03-07T23:31:17.509ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375632025-03-07T23:31:17.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375642025-03-07T23:31:17.515ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
375652025-03-07T23:31:17.515ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
375662025-03-07T23:31:17.515ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375672025-03-07T23:31:17.515ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375682025-03-07T23:31:17.515ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375692025-03-07T23:31:17.519ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
375702025-03-07T23:31:17.519ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375712025-03-07T23:31:17.520ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375722025-03-07T23:31:17.521ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375732025-03-07T23:31:17.523ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
375742025-03-07T23:31:17.527ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
375752025-03-07T23:31:17.527ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375762025-03-07T23:31:17.528ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375772025-03-07T23:31:17.529ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375782025-03-07T23:31:17.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
375792025-03-07T23:31:17.545ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
375802025-03-07T23:31:17.545ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375812025-03-07T23:31:17.545ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375822025-03-07T23:31:17.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375832025-03-07T23:31:17.548ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
375842025-03-07T23:31:17.548ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
375852025-03-07T23:31:17.548ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
375862025-03-07T23:31:17.549ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
375872025-03-07T23:31:17.553ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
375882025-03-07T23:31:17.556ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
375892025-03-07T23:31:17.556ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 uri = /v1/instances/demo-instance/serial-console?project=demo-project
375902025-03-07T23:31:17.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
375912025-03-07T23:31:17.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
375922025-03-07T23:31:17.557ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
375932025-03-07T23:31:17.569ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
375942025-03-07T23:31:17.569ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
375952025-03-07T23:31:17.572ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
375962025-03-07T23:31:17.572ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
375972025-03-07T23:31:17.573ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
375982025-03-07T23:31:17.576ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
375992025-03-07T23:31:17.578ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
376002025-03-07T23:31:17.578ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
376012025-03-07T23:31:17.578ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
376022025-03-07T23:31:17.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
376032025-03-07T23:31:17.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
376042025-03-07T23:31:17.580ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
376052025-03-07T23:31:17.590ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console?project=demo-project
376062025-03-07T23:31:17.590ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/serial-console?project=demo-project
376072025-03-07T23:31:17.590ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
376082025-03-07T23:31:17.590ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
376092025-03-07T23:31:17.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
376102025-03-07T23:31:17.594ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console?project=demo-project
376112025-03-07T23:31:17.595ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
376122025-03-07T23:31:17.595ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
376132025-03-07T23:31:17.595ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
376142025-03-07T23:31:17.606ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console?project=demo-project
376152025-03-07T23:31:17.606ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database uri = /v1/instances/demo-instance/serial-console?project=demo-project
376162025-03-07T23:31:17.606ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
376172025-03-07T23:31:17.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console?project=demo-project
376182025-03-07T23:31:17.616ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console?project=demo-project
376192025-03-07T23:31:17.644ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/serial-console?project=demo-project
376202025-03-07T23:31:17.645ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 142622 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 4620b83b-7f2d-4c5d-9b33-2f6790c91252 response_code = 404 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376212025-03-07T23:31:17.647ZINFOtest_unauthorized (external client test context): client received response status = 404
376222025-03-07T23:31:17.647ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
376232025-03-07T23:31:17.647ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376242025-03-07T23:31:17.648ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 551306bc-235e-45b4-999b-14b2b7666942 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376252025-03-07T23:31:17.648ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 551306bc-235e-45b4-999b-14b2b7666942 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376262025-03-07T23:31:17.648ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 551306bc-235e-45b4-999b-14b2b7666942 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376272025-03-07T23:31:17.649ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 551306bc-235e-45b4-999b-14b2b7666942 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376282025-03-07T23:31:17.649ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1111 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 551306bc-235e-45b4-999b-14b2b7666942 response_code = 401 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376292025-03-07T23:31:17.649ZINFOtest_unauthorized (external client test context): client received response status = 401
376302025-03-07T23:31:17.649ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
376312025-03-07T23:31:17.649ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376322025-03-07T23:31:17.650ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1e68e39-63f0-41a7-a1b8-68af9539a5d4 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376332025-03-07T23:31:17.650ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1e68e39-63f0-41a7-a1b8-68af9539a5d4 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376342025-03-07T23:31:17.650ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1e68e39-63f0-41a7-a1b8-68af9539a5d4 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376352025-03-07T23:31:17.650ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 499 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = b1e68e39-63f0-41a7-a1b8-68af9539a5d4 response_code = 401 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376362025-03-07T23:31:17.652ZINFOtest_unauthorized (external client test context): client received response status = 401
376372025-03-07T23:31:17.652ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/serial-console?project=demo-project
376382025-03-07T23:31:17.652ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376392025-03-07T23:31:17.652ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 26ed240b-64c4-4fca-91e6-5c48576edb03 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376402025-03-07T23:31:17.653ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 26ed240b-64c4-4fca-91e6-5c48576edb03 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376412025-03-07T23:31:17.655ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2295:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::params::InstanceSerialConsoleData>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2314:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn_env#0}, dropshot::handler::HttpResponseOk<nexus_types::external_api::params::InstanceSerialConsoleData>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_serial_console::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSerialConsoleRequest>), dropshot::handler::HttpResponseOk<nexus_types::external_api::params::InstanceSerialConsoleData>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 26ed240b-64c4-4fca-91e6-5c48576edb03 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376422025-03-07T23:31:17.655ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2445 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 26ed240b-64c4-4fca-91e6-5c48576edb03 response_code = 401 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376432025-03-07T23:31:17.661ZINFOtest_unauthorized (external client test context): client received response status = 401
376442025-03-07T23:31:17.662ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
376452025-03-07T23:31:17.662ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376462025-03-07T23:31:17.662ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e829aebb-572e-4db9-97e6-caec22daa9e0 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376472025-03-07T23:31:17.662ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 245 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e829aebb-572e-4db9-97e6-caec22daa9e0 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376482025-03-07T23:31:17.663ZINFOtest_unauthorized (external client test context): client received response status = 405
376492025-03-07T23:31:17.663ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
376502025-03-07T23:31:17.663ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376512025-03-07T23:31:17.663ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1e7d7ae2-462b-4839-9e9e-ceed9232d852 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376522025-03-07T23:31:17.663ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 192 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = 1e7d7ae2-462b-4839-9e9e-ceed9232d852 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376532025-03-07T23:31:17.664ZINFOtest_unauthorized (external client test context): client received response status = 405
376542025-03-07T23:31:17.664ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
376552025-03-07T23:31:17.664ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376562025-03-07T23:31:17.664ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c11f0c65-3dc3-4187-89fb-d30c7da6c5e5 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376572025-03-07T23:31:17.664ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 153 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = c11f0c65-3dc3-4187-89fb-d30c7da6c5e5 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376582025-03-07T23:31:17.665ZINFOtest_unauthorized (external client test context): client received response status = 405
376592025-03-07T23:31:17.665ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/serial-console?project=demo-project
376602025-03-07T23:31:17.665ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376612025-03-07T23:31:17.665ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e68eed10-157b-4feb-9364-1eb221760668 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376622025-03-07T23:31:17.665ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 137 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:59739 req_id = e68eed10-157b-4feb-9364-1eb221760668 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376632025-03-07T23:31:17.666ZINFOtest_unauthorized (external client test context): client received response status = 405
376642025-03-07T23:31:17.666ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
376652025-03-07T23:31:17.666ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376662025-03-07T23:31:17.666ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d87d183-a901-4aaf-a14b-bd9545930018 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376672025-03-07T23:31:17.666ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 142 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = 5d87d183-a901-4aaf-a14b-bd9545930018 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376682025-03-07T23:31:17.667ZINFOtest_unauthorized (external client test context): client received response status = 405
376692025-03-07T23:31:17.667ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
376702025-03-07T23:31:17.667ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376712025-03-07T23:31:17.667ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b025dbf0-1168-4024-8080-508e90c43768 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376722025-03-07T23:31:17.667ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 130 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b025dbf0-1168-4024-8080-508e90c43768 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376732025-03-07T23:31:17.667ZINFOtest_unauthorized (external client test context): client received response status = 405
376742025-03-07T23:31:17.668ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
376752025-03-07T23:31:17.668ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376762025-03-07T23:31:17.668ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a2d224ac-b46e-4081-9c0d-7ff294ec8cf4 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376772025-03-07T23:31:17.668ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 147 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = a2d224ac-b46e-4081-9c0d-7ff294ec8cf4 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376782025-03-07T23:31:17.668ZINFOtest_unauthorized (external client test context): client received response status = 405
376792025-03-07T23:31:17.669ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/serial-console?project=demo-project
376802025-03-07T23:31:17.671ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376812025-03-07T23:31:17.672ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b8f7dc7c-bea8-4b15-802d-0a54f75532e3 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376822025-03-07T23:31:17.672ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 140 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:59739 req_id = b8f7dc7c-bea8-4b15-802d-0a54f75532e3 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376832025-03-07T23:31:17.673ZINFOtest_unauthorized (external client test context): client received response status = 405
376842025-03-07T23:31:17.673ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
376852025-03-07T23:31:17.673ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376862025-03-07T23:31:17.674ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 91f5cdfe-74a5-4fe6-a093-cb3505523039 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376872025-03-07T23:31:17.675ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 905 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 91f5cdfe-74a5-4fe6-a093-cb3505523039 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376882025-03-07T23:31:17.676ZINFOtest_unauthorized (external client test context): client received response status = 405
376892025-03-07T23:31:17.676ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
376902025-03-07T23:31:17.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376912025-03-07T23:31:17.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 49b88487-d79e-45e0-87e9-ceeccb2ec98d uri = /v1/instances/demo-instance/serial-console?project=demo-project
376922025-03-07T23:31:17.676ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 49b88487-d79e-45e0-87e9-ceeccb2ec98d response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376932025-03-07T23:31:17.676ZINFOtest_unauthorized (external client test context): client received response status = 405
376942025-03-07T23:31:17.676ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
376952025-03-07T23:31:17.676ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
376962025-03-07T23:31:17.676ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 214ec2fc-ddc7-4061-944f-94a82f2a1c26 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376972025-03-07T23:31:17.677ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 120 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 214ec2fc-ddc7-4061-944f-94a82f2a1c26 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
376982025-03-07T23:31:17.677ZINFOtest_unauthorized (external client test context): client received response status = 405
376992025-03-07T23:31:17.677ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/serial-console?project=demo-project
377002025-03-07T23:31:17.677ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
377012025-03-07T23:31:17.677ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 11813a25-a847-4ebe-9e3b-3d9d2a352963 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377022025-03-07T23:31:17.677ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:59739 req_id = 11813a25-a847-4ebe-9e3b-3d9d2a352963 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377032025-03-07T23:31:17.677ZINFOtest_unauthorized (external client test context): client received response status = 405
377042025-03-07T23:31:17.677ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
377052025-03-07T23:31:17.677ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
377062025-03-07T23:31:17.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2c7f7340-2212-4433-ba5c-d358766cdce2 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377072025-03-07T23:31:17.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 2c7f7340-2212-4433-ba5c-d358766cdce2 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377082025-03-07T23:31:17.678ZINFOtest_unauthorized (external client test context): client received response status = 405
377092025-03-07T23:31:17.678ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
377102025-03-07T23:31:17.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
377112025-03-07T23:31:17.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3f343f8-081b-430d-ad9c-3427dec92845 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377122025-03-07T23:31:17.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = f3f343f8-081b-430d-ad9c-3427dec92845 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377132025-03-07T23:31:17.678ZINFOtest_unauthorized (external client test context): client received response status = 405
377142025-03-07T23:31:17.678ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
377152025-03-07T23:31:17.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
377162025-03-07T23:31:17.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 67d5d41f-db4f-479a-88f7-633b105b78ab uri = /v1/instances/demo-instance/serial-console?project=demo-project
377172025-03-07T23:31:17.679ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = 67d5d41f-db4f-479a-88f7-633b105b78ab response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377182025-03-07T23:31:17.679ZINFOtest_unauthorized (external client test context): client received response status = 405
377192025-03-07T23:31:17.680ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/serial-console?project=demo-project
377202025-03-07T23:31:17.680ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console?project=demo-project
377212025-03-07T23:31:17.680ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ed99c53a-b40f-4dcb-8427-334069c7e681 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377222025-03-07T23:31:17.680ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 45 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:59739 req_id = ed99c53a-b40f-4dcb-8427-334069c7e681 response_code = 405 uri = /v1/instances/demo-instance/serial-console?project=demo-project
377232025-03-07T23:31:17.680ZINFOtest_unauthorized (external client test context): client received response status = 405
377242025-03-07T23:31:17.680ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/serial-console?project=demo-project
377252025-03-07T23:31:17.680ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377262025-03-07T23:31:17.680ZINFOtest_unauthorized: test: privileged GET WebSocket url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377272025-03-07T23:31:17.681ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377282025-03-07T23:31:17.681ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377292025-03-07T23:31:17.682ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 341 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377302025-03-07T23:31:17.682ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377312025-03-07T23:31:17.682ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377322025-03-07T23:31:17.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377332025-03-07T23:31:17.682ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377342025-03-07T23:31:17.683ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377352025-03-07T23:31:17.683ZINFOtest_unauthorized (external client test context): client received response status = 101
377362025-03-07T23:31:17.683ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377372025-03-07T23:31:17.683ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377382025-03-07T23:31:17.683ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:48685 remote_addr = 127.0.0.1:37313
377392025-03-07T23:31:17.684ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377402025-03-07T23:31:17.684ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 327 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377412025-03-07T23:31:17.684ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377422025-03-07T23:31:17.684ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377432025-03-07T23:31:17.684ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377442025-03-07T23:31:17.684ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377452025-03-07T23:31:17.685ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377462025-03-07T23:31:17.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377472025-03-07T23:31:17.685ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377482025-03-07T23:31:17.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377492025-03-07T23:31:17.686ZINFOtest_unauthorized (external client test context): client received response status = 101
377502025-03-07T23:31:17.686ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377512025-03-07T23:31:17.686ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377522025-03-07T23:31:17.686ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:48685 remote_addr = 127.0.0.1:36821
377532025-03-07T23:31:17.686ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:36821 req_id = c55b790f-91ce-4987-a767-ba9f272d9813 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377542025-03-07T23:31:17.686ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 176 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:36821 req_id = c55b790f-91ce-4987-a767-ba9f272d9813 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377552025-03-07T23:31:17.687ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:36821 req_id = c55b790f-91ce-4987-a767-ba9f272d9813 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377562025-03-07T23:31:17.687ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:36821 req_id = c55b790f-91ce-4987-a767-ba9f272d9813 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377572025-03-07T23:31:17.687ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:36821 req_id = c55b790f-91ce-4987-a767-ba9f272d9813 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377582025-03-07T23:31:17.687ZERROtest_unauthorized (dropshot_external): Error returned from handler: Unauthenticated { internal_message: "looking up Organization by name: Actor required" } local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:36821 req_id = c55b790f-91ce-4987-a767-ba9f272d9813 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377592025-03-07T23:31:17.687ZINFOtest_unauthorized (external client test context): client received response status = 101
377602025-03-07T23:31:17.687ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377612025-03-07T23:31:17.687ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377622025-03-07T23:31:17.687ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:48685 remote_addr = 127.0.0.1:48118
377632025-03-07T23:31:17.687ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:48118 req_id = c422aaec-ce72-4c22-b0c4-240f81b4a64d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377642025-03-07T23:31:17.688ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 228 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:48118 req_id = c422aaec-ce72-4c22-b0c4-240f81b4a64d response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377652025-03-07T23:31:17.688ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:48118 req_id = c422aaec-ce72-4c22-b0c4-240f81b4a64d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377662025-03-07T23:31:17.688ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:48118 req_id = c422aaec-ce72-4c22-b0c4-240f81b4a64d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377672025-03-07T23:31:17.688ZERROtest_unauthorized (dropshot_external): Error returned from handler: HttpError { status_code: 401, error_code: Some("Unauthorized"), external_message: "credentials missing or invalid", internal_message: "unknown actor \"Jack-Donaghy\"", headers: None } local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:48118 req_id = c422aaec-ce72-4c22-b0c4-240f81b4a64d upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377682025-03-07T23:31:17.688ZINFOtest_unauthorized (external client test context): client received response status = 101
377692025-03-07T23:31:17.688ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377702025-03-07T23:31:17.688ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377712025-03-07T23:31:17.688ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:48685 remote_addr = 127.0.0.1:54957
377722025-03-07T23:31:17.689ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:54957 req_id = 06a4a09b-4de3-47ec-8155-bff1362cf1d2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377732025-03-07T23:31:17.689ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 334 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:54957 req_id = 06a4a09b-4de3-47ec-8155-bff1362cf1d2 response_code = 101 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377742025-03-07T23:31:17.689ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:54957 req_id = 06a4a09b-4de3-47ec-8155-bff1362cf1d2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377752025-03-07T23:31:17.691ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2327:73 11: {async_block#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl> at ./external-api/src/lib.rs:1202:5 12: {async_block#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/websocket.rs:240:69 13: poll<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 14: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 15: with_mut<tokio::runtime::task::core::Stage<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>>, core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 16: poll<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 17: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 18: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 19: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 20: __rust_try 21: try<core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 22: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<core::pin::Pin<alloc::boxed::Box<dropshot::websocket::{impl#1}::handle::{async_block_env#0}<nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>, nexus_external_api::nexus_external_api_mod::api_description::instance_serial_console_stream_adapter::{async_fn#0}::{closure#0}::{async_block_env#0}<omicron_nexus::external_api::http_entrypoints::NexusExternalApiImpl>>, alloc::alloc::Global>>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<core::result::Result<(), alloc::boxed::Box<(dyn core::error::Error + core::marker::Send + core::marker::Sync), alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 23: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 24: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 25: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 26: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 27: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 28: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 29: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 30: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 31: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 32: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 33: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 34: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 35: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 36: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 37: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 38: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 39: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 40: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 41: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 42: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 43: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 44: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 45: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 46: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 47: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 48: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 49: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 50: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 51: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 52: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 53: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 54: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 55: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 56: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 57: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 58: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 59: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 60: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 61: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 62: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 63: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 64: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 65: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 66: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 67: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 68: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 69: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 70: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 71: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 72: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 73: _thrp_setup 74: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:54957 req_id = 06a4a09b-4de3-47ec-8155-bff1362cf1d2 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377762025-03-07T23:31:17.691ZERROtest_unauthorized (dropshot_external): Error returned from handler: HttpError { status_code: 401, error_code: Some("Unauthorized"), external_message: "credentials missing or invalid", internal_message: "bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list", headers: None } local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:54957 req_id = 06a4a09b-4de3-47ec-8155-bff1362cf1d2 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377772025-03-07T23:31:17.693ZINFOtest_unauthorized (external client test context): client received response status = 101
377782025-03-07T23:31:17.693ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377792025-03-07T23:31:17.693ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377802025-03-07T23:31:17.693ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377812025-03-07T23:31:17.693ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377822025-03-07T23:31:17.694ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377832025-03-07T23:31:17.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
377842025-03-07T23:31:17.695ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
377852025-03-07T23:31:17.695ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377862025-03-07T23:31:17.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377872025-03-07T23:31:17.696ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377882025-03-07T23:31:17.696ZINFOtest_unauthorized (dropshot_external): accepted connection local_addr = 127.0.0.1:48685 remote_addr = 127.0.0.1:34346
377892025-03-07T23:31:17.697ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 674c5638-314d-4312-a378-02e45ca2afe8 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377902025-03-07T23:31:17.697ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 674c5638-314d-4312-a378-02e45ca2afe8 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377912025-03-07T23:31:17.697ZINFOtest_unauthorized (external client test context): client received response status = 405
377922025-03-07T23:31:17.697ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
377932025-03-07T23:31:17.697ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
377942025-03-07T23:31:17.697ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
377952025-03-07T23:31:17.697ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
377962025-03-07T23:31:17.697ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
377972025-03-07T23:31:17.697ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
377982025-03-07T23:31:17.698ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
377992025-03-07T23:31:17.698ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
378002025-03-07T23:31:17.698ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378012025-03-07T23:31:17.698ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378022025-03-07T23:31:17.699ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378032025-03-07T23:31:17.700ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 6f8f8396-4bb7-4f8d-ae6c-83325f5b65f9 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378042025-03-07T23:31:17.700ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 124 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 6f8f8396-4bb7-4f8d-ae6c-83325f5b65f9 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378052025-03-07T23:31:17.700ZINFOtest_unauthorized (external client test context): client received response status = 405
378062025-03-07T23:31:17.700ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378072025-03-07T23:31:17.700ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
378082025-03-07T23:31:17.700ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
378092025-03-07T23:31:17.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378102025-03-07T23:31:17.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378112025-03-07T23:31:17.701ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378122025-03-07T23:31:17.701ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
378132025-03-07T23:31:17.704ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
378142025-03-07T23:31:17.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378152025-03-07T23:31:17.704ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378162025-03-07T23:31:17.705ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378172025-03-07T23:31:17.708ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 7b7cc8d4-c079-4ee6-bd64-0805f227ec82 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378182025-03-07T23:31:17.708ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 86 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 7b7cc8d4-c079-4ee6-bd64-0805f227ec82 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378192025-03-07T23:31:17.708ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
378202025-03-07T23:31:17.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
378212025-03-07T23:31:17.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378222025-03-07T23:31:17.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378232025-03-07T23:31:17.713ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378242025-03-07T23:31:17.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
378252025-03-07T23:31:17.713ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
378262025-03-07T23:31:17.713ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378272025-03-07T23:31:17.713ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378282025-03-07T23:31:17.714ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378292025-03-07T23:31:17.714ZINFOtest_unauthorized (external client test context): client received response status = 405
378302025-03-07T23:31:17.715ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378312025-03-07T23:31:17.715ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
378322025-03-07T23:31:17.716ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
378332025-03-07T23:31:17.716ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
378342025-03-07T23:31:17.716ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378352025-03-07T23:31:17.716ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378362025-03-07T23:31:17.718ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378372025-03-07T23:31:17.718ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
378382025-03-07T23:31:17.718ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378392025-03-07T23:31:17.718ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378402025-03-07T23:31:17.721ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378412025-03-07T23:31:17.725ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
378422025-03-07T23:31:17.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
378432025-03-07T23:31:17.725ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
378442025-03-07T23:31:17.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
378452025-03-07T23:31:17.727ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = d523b69a-789f-4579-a1d1-577a4c08414b uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378462025-03-07T23:31:17.727ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 529 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = d523b69a-789f-4579-a1d1-577a4c08414b response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378472025-03-07T23:31:17.728ZINFOtest_unauthorized (external client test context): client received response status = 405
378482025-03-07T23:31:17.728ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378492025-03-07T23:31:17.728ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
378502025-03-07T23:31:17.729ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
378512025-03-07T23:31:17.732ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
378522025-03-07T23:31:17.732ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378532025-03-07T23:31:17.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378542025-03-07T23:31:17.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378552025-03-07T23:31:17.733ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378562025-03-07T23:31:17.734ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
378572025-03-07T23:31:17.739ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
378582025-03-07T23:31:17.742ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378592025-03-07T23:31:17.742ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378602025-03-07T23:31:17.742ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378612025-03-07T23:31:17.742ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378622025-03-07T23:31:17.743ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378632025-03-07T23:31:17.744ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378642025-03-07T23:31:17.744ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378652025-03-07T23:31:17.744ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 462e56f2-2802-4643-85a6-c97d586240fa uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378662025-03-07T23:31:17.744ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 75 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 462e56f2-2802-4643-85a6-c97d586240fa response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378672025-03-07T23:31:17.758ZINFOtest_unauthorized (external client test context): client received response status = 405
378682025-03-07T23:31:17.758ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378692025-03-07T23:31:17.758ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
378702025-03-07T23:31:17.761ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378712025-03-07T23:31:17.761ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378722025-03-07T23:31:17.762ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378732025-03-07T23:31:17.762ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378742025-03-07T23:31:17.762ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378752025-03-07T23:31:17.763ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378762025-03-07T23:31:17.765ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 4957291b-133c-47e9-b2a6-df7800d4b41f uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378772025-03-07T23:31:17.767ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1417 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 4957291b-133c-47e9-b2a6-df7800d4b41f response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378782025-03-07T23:31:17.767ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378792025-03-07T23:31:17.767ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378802025-03-07T23:31:17.767ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378812025-03-07T23:31:17.767ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378822025-03-07T23:31:17.768ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378832025-03-07T23:31:17.770ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378842025-03-07T23:31:17.770ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378852025-03-07T23:31:17.771ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378862025-03-07T23:31:17.777ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378872025-03-07T23:31:17.777ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378882025-03-07T23:31:17.777ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378892025-03-07T23:31:17.778ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378902025-03-07T23:31:17.783ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378912025-03-07T23:31:17.784ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378922025-03-07T23:31:17.784ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378932025-03-07T23:31:17.784ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378942025-03-07T23:31:17.785ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378952025-03-07T23:31:17.789ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378962025-03-07T23:31:17.789ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378972025-03-07T23:31:17.789ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378982025-03-07T23:31:17.789ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
378992025-03-07T23:31:17.791ZINFOtest_unauthorized (external client test context): client received response status = 405
379002025-03-07T23:31:17.792ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379012025-03-07T23:31:17.792ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379022025-03-07T23:31:17.793ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379032025-03-07T23:31:17.793ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379042025-03-07T23:31:17.793ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379052025-03-07T23:31:17.796ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379062025-03-07T23:31:17.796ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379072025-03-07T23:31:17.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379082025-03-07T23:31:17.804ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379092025-03-07T23:31:17.804ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379102025-03-07T23:31:17.804ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379112025-03-07T23:31:17.804ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379122025-03-07T23:31:17.804ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379132025-03-07T23:31:17.811ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379142025-03-07T23:31:17.812ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379152025-03-07T23:31:17.812ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379162025-03-07T23:31:17.813ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379172025-03-07T23:31:17.814ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 80a72830-164a-448e-84c1-855e402a5295 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379182025-03-07T23:31:17.814ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 128 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 80a72830-164a-448e-84c1-855e402a5295 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379192025-03-07T23:31:17.819ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379202025-03-07T23:31:17.819ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379212025-03-07T23:31:17.819ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379222025-03-07T23:31:17.820ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379232025-03-07T23:31:17.822ZINFOtest_unauthorized (external client test context): client received response status = 405
379242025-03-07T23:31:17.822ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379252025-03-07T23:31:17.822ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379262025-03-07T23:31:17.825ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379272025-03-07T23:31:17.853ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379282025-03-07T23:31:17.860ZERROtest_unauthorized (dropshot_external): Error returned from handler: ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") } local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:37313 req_id = 012ab4dd-7158-436d-abb3-5d4437fcb0c0 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379292025-03-07T23:31:17.861ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379302025-03-07T23:31:17.862ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379312025-03-07T23:31:17.862ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379322025-03-07T23:31:17.863ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379332025-03-07T23:31:17.875ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 78738877-d93f-4284-9299-a68f67e2bd0e uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379342025-03-07T23:31:17.875ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 195 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 78738877-d93f-4284-9299-a68f67e2bd0e response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379352025-03-07T23:31:17.883ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379362025-03-07T23:31:17.896ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379372025-03-07T23:31:17.896ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379382025-03-07T23:31:17.896ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379392025-03-07T23:31:17.897ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379402025-03-07T23:31:17.901ZINFOtest_unauthorized (external client test context): client received response status = 405
379412025-03-07T23:31:17.901ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379422025-03-07T23:31:17.901ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379432025-03-07T23:31:17.908ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = b0ebc1a1-5eb8-415a-b01f-58908a4a2b41 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379442025-03-07T23:31:17.908ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 85 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = b0ebc1a1-5eb8-415a-b01f-58908a4a2b41 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379452025-03-07T23:31:17.910ZERROtest_unauthorized (dropshot_external): Error returned from handler: InvalidRequest { message: MessagePair { external_message: "cannot connect to serial console of instance in state \"starting\"", internal_context: "" } } local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:59739 req_id = 94b77baa-a997-4865-b270-e23284b8e435 upgrade = websocket uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379462025-03-07T23:31:17.912ZINFOtest_unauthorized (external client test context): client received response status = 405
379472025-03-07T23:31:17.912ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379482025-03-07T23:31:17.912ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379492025-03-07T23:31:17.915ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 02ca33f1-34f8-4aa4-bf9f-decf45d2e9c0 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379502025-03-07T23:31:17.915ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 80 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 02ca33f1-34f8-4aa4-bf9f-decf45d2e9c0 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379512025-03-07T23:31:17.915ZINFOtest_unauthorized (external client test context): client received response status = 405
379522025-03-07T23:31:17.916ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379532025-03-07T23:31:17.916ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379542025-03-07T23:31:17.924ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 5db6f8a5-f27f-47ec-a6e2-ffca5516019b uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379552025-03-07T23:31:17.924ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 124 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 5db6f8a5-f27f-47ec-a6e2-ffca5516019b response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379562025-03-07T23:31:17.939ZINFOtest_unauthorized (external client test context): client received response status = 405
379572025-03-07T23:31:17.939ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379582025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379592025-03-07T23:31:17.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 3c0800a7-81c1-43e6-8408-7a1b02c35362 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379602025-03-07T23:31:17.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 3c0800a7-81c1-43e6-8408-7a1b02c35362 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379612025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client received response status = 405
379622025-03-07T23:31:17.940ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379632025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379642025-03-07T23:31:17.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 777be283-49f9-4b24-a1d3-4027f5dfc525 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379652025-03-07T23:31:17.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 50 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 777be283-49f9-4b24-a1d3-4027f5dfc525 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379662025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client received response status = 405
379672025-03-07T23:31:17.940ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379682025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379692025-03-07T23:31:17.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = d6eb302c-efba-4e7c-87e9-bb2c29cf22fb uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379702025-03-07T23:31:17.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = d6eb302c-efba-4e7c-87e9-bb2c29cf22fb response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379712025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client received response status = 405
379722025-03-07T23:31:17.940ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379732025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379742025-03-07T23:31:17.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 0c2ff871-9831-49cf-a381-f2e8cc2a279d uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379752025-03-07T23:31:17.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 0c2ff871-9831-49cf-a381-f2e8cc2a279d response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379762025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client received response status = 405
379772025-03-07T23:31:17.940ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379782025-03-07T23:31:17.940ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/serial-console/stream?project=demo-project
379792025-03-07T23:31:17.940ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = e398ee37-dd84-4ef0-900d-6b6250e28059 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379802025-03-07T23:31:17.940ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = e398ee37-dd84-4ef0-900d-6b6250e28059 response_code = 405 uri = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379812025-03-07T23:31:17.941ZINFOtest_unauthorized (external client test context): client received response status = 405
379822025-03-07T23:31:17.941ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/serial-console/stream?project=demo-project
379832025-03-07T23:31:17.941ZINFOtest_unauthorized: test: begin endpoint url = /v1/network-interfaces?project=demo-project&instance=demo-instance
379842025-03-07T23:31:17.941ZINFOtest_unauthorized: test: privileged GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
379852025-03-07T23:31:17.941ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
379862025-03-07T23:31:17.942ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379872025-03-07T23:31:17.942ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379882025-03-07T23:31:17.942ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
379892025-03-07T23:31:17.942ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
379902025-03-07T23:31:17.942ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
379912025-03-07T23:31:17.942ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
379922025-03-07T23:31:17.943ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
379932025-03-07T23:31:17.943ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
379942025-03-07T23:31:17.943ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
379952025-03-07T23:31:17.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
379962025-03-07T23:31:17.951ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
379972025-03-07T23:31:17.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
379982025-03-07T23:31:17.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
379992025-03-07T23:31:17.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380002025-03-07T23:31:17.951ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
380012025-03-07T23:31:17.951ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380022025-03-07T23:31:17.951ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380032025-03-07T23:31:17.951ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380042025-03-07T23:31:17.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
380052025-03-07T23:31:17.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
380062025-03-07T23:31:17.965ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380072025-03-07T23:31:17.965ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380082025-03-07T23:31:17.965ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380092025-03-07T23:31:17.969ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
380102025-03-07T23:31:17.969ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
380112025-03-07T23:31:17.970ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380122025-03-07T23:31:17.970ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380132025-03-07T23:31:17.970ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380142025-03-07T23:31:17.978ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
380152025-03-07T23:31:17.978ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380162025-03-07T23:31:17.978ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380172025-03-07T23:31:17.978ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380182025-03-07T23:31:18.005ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
380192025-03-07T23:31:18.010ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
380202025-03-07T23:31:18.010ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380212025-03-07T23:31:18.013ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380222025-03-07T23:31:18.013ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380232025-03-07T23:31:18.013ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380242025-03-07T23:31:18.017ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380252025-03-07T23:31:18.017ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380262025-03-07T23:31:18.018ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380272025-03-07T23:31:18.028ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380282025-03-07T23:31:18.028ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380292025-03-07T23:31:18.034ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380302025-03-07T23:31:18.037ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380312025-03-07T23:31:18.037ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380322025-03-07T23:31:18.037ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380332025-03-07T23:31:18.037ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380342025-03-07T23:31:18.037ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380352025-03-07T23:31:18.042ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380362025-03-07T23:31:18.043ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380372025-03-07T23:31:18.043ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380382025-03-07T23:31:18.047ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380392025-03-07T23:31:18.051ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380402025-03-07T23:31:18.051ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380412025-03-07T23:31:18.051ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380422025-03-07T23:31:18.052ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380432025-03-07T23:31:18.057ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380442025-03-07T23:31:18.072ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380452025-03-07T23:31:18.072ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380462025-03-07T23:31:18.072ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380472025-03-07T23:31:18.072ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380482025-03-07T23:31:18.072ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380492025-03-07T23:31:18.073ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380502025-03-07T23:31:18.077ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380512025-03-07T23:31:18.077ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380522025-03-07T23:31:18.078ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380532025-03-07T23:31:18.093ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380542025-03-07T23:31:18.098ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380552025-03-07T23:31:18.098ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380562025-03-07T23:31:18.098ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380572025-03-07T23:31:18.099ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380582025-03-07T23:31:18.103ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380592025-03-07T23:31:18.114ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380602025-03-07T23:31:18.114ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380612025-03-07T23:31:18.114ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380622025-03-07T23:31:18.115ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380632025-03-07T23:31:18.124ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 189014 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 179b3a26-7ea2-4684-b58e-2b9882a0a739 response_code = 200 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380642025-03-07T23:31:18.125ZINFOtest_unauthorized (external client test context): client received response status = 200
380652025-03-07T23:31:18.125ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
380662025-03-07T23:31:18.125ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
380672025-03-07T23:31:18.125ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380682025-03-07T23:31:18.126ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380692025-03-07T23:31:18.126ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
380702025-03-07T23:31:18.126ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380712025-03-07T23:31:18.126ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380722025-03-07T23:31:18.126ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380732025-03-07T23:31:18.150ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380742025-03-07T23:31:18.150ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380752025-03-07T23:31:18.151ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380762025-03-07T23:31:18.156ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
380772025-03-07T23:31:18.157ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
380782025-03-07T23:31:18.157ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380792025-03-07T23:31:18.157ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380802025-03-07T23:31:18.158ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380812025-03-07T23:31:18.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
380822025-03-07T23:31:18.159ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
380832025-03-07T23:31:18.159ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
380842025-03-07T23:31:18.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
380852025-03-07T23:31:18.169ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
380862025-03-07T23:31:18.169ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380872025-03-07T23:31:18.169ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380882025-03-07T23:31:18.170ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380892025-03-07T23:31:18.171ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
380902025-03-07T23:31:18.171ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
380912025-03-07T23:31:18.180ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
380922025-03-07T23:31:18.192ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
380932025-03-07T23:31:18.192ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
380942025-03-07T23:31:18.192ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
380952025-03-07T23:31:18.193ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
380962025-03-07T23:31:18.194ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
380972025-03-07T23:31:18.194ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
380982025-03-07T23:31:18.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
380992025-03-07T23:31:18.198ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
381002025-03-07T23:31:18.199ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381012025-03-07T23:31:18.199ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381022025-03-07T23:31:18.200ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381032025-03-07T23:31:18.204ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
381042025-03-07T23:31:18.204ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381052025-03-07T23:31:18.204ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381062025-03-07T23:31:18.207ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381072025-03-07T23:31:18.213ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
381082025-03-07T23:31:18.219ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
381092025-03-07T23:31:18.219ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381102025-03-07T23:31:18.219ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381112025-03-07T23:31:18.219ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381122025-03-07T23:31:18.220ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381132025-03-07T23:31:18.222ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381142025-03-07T23:31:18.222ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381152025-03-07T23:31:18.223ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381162025-03-07T23:31:18.226ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381172025-03-07T23:31:18.226ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381182025-03-07T23:31:18.227ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381192025-03-07T23:31:18.235ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381202025-03-07T23:31:18.235ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381212025-03-07T23:31:18.235ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381222025-03-07T23:31:18.235ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381232025-03-07T23:31:18.239ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381242025-03-07T23:31:18.243ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381252025-03-07T23:31:18.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381262025-03-07T23:31:18.243ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381272025-03-07T23:31:18.245ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381282025-03-07T23:31:18.249ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381292025-03-07T23:31:18.249ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381302025-03-07T23:31:18.249ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381312025-03-07T23:31:18.251ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381322025-03-07T23:31:18.259ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
381332025-03-07T23:31:18.261ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381342025-03-07T23:31:18.290ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381352025-03-07T23:31:18.290ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 165334 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5ef20f1-9d89-42c5-b869-ac3ffe3527ee response_code = 404 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381362025-03-07T23:31:18.291ZINFOtest_unauthorized (external client test context): client received response status = 404
381372025-03-07T23:31:18.292ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381382025-03-07T23:31:18.292ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381392025-03-07T23:31:18.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 12d2009c-8e0b-42c3-8a0a-a7108e2ff984 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381402025-03-07T23:31:18.292ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 12d2009c-8e0b-42c3-8a0a-a7108e2ff984 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381412025-03-07T23:31:18.292ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 12d2009c-8e0b-42c3-8a0a-a7108e2ff984 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381422025-03-07T23:31:18.292ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 12d2009c-8e0b-42c3-8a0a-a7108e2ff984 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381432025-03-07T23:31:18.292ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 304 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 12d2009c-8e0b-42c3-8a0a-a7108e2ff984 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381442025-03-07T23:31:18.292ZINFOtest_unauthorized (external client test context): client received response status = 401
381452025-03-07T23:31:18.292ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381462025-03-07T23:31:18.292ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381472025-03-07T23:31:18.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = fd6df761-962a-4f47-a148-d6fdce0d66f1 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381482025-03-07T23:31:18.293ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = fd6df761-962a-4f47-a148-d6fdce0d66f1 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381492025-03-07T23:31:18.293ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = fd6df761-962a-4f47-a148-d6fdce0d66f1 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381502025-03-07T23:31:18.293ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 175 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = fd6df761-962a-4f47-a148-d6fdce0d66f1 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381512025-03-07T23:31:18.310ZINFOtest_unauthorized (external client test context): client received response status = 401
381522025-03-07T23:31:18.310ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381532025-03-07T23:31:18.310ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381542025-03-07T23:31:18.310ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dea8a7f7-1b2d-41cb-a380-055641576e4e uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381552025-03-07T23:31:18.311ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dea8a7f7-1b2d-41cb-a380-055641576e4e uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381562025-03-07T23:31:18.314ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4514:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4542:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>, dropshot::error::HttpError, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_list::{async_fn_env#0}, (dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::InstanceSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<omicron_common::api::external::InstanceNetworkInterface>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dea8a7f7-1b2d-41cb-a380-055641576e4e uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381572025-03-07T23:31:18.314ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3773 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dea8a7f7-1b2d-41cb-a380-055641576e4e response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381582025-03-07T23:31:18.314ZINFOtest_unauthorized (external client test context): client received response status = 401
381592025-03-07T23:31:18.314ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381602025-03-07T23:31:18.314ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381612025-03-07T23:31:18.315ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 8913e280-5f2e-458c-915d-3968713424c1 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381622025-03-07T23:31:18.315ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 312 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 8913e280-5f2e-458c-915d-3968713424c1 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381632025-03-07T23:31:18.318ZINFOtest_unauthorized (external client test context): client received response status = 405
381642025-03-07T23:31:18.319ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381652025-03-07T23:31:18.319ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381662025-03-07T23:31:18.320ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = df70d3ed-a73e-4416-b595-9c0127c5b84c uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381672025-03-07T23:31:18.320ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 70 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = df70d3ed-a73e-4416-b595-9c0127c5b84c response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381682025-03-07T23:31:18.320ZINFOtest_unauthorized (external client test context): client received response status = 405
381692025-03-07T23:31:18.320ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381702025-03-07T23:31:18.320ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381712025-03-07T23:31:18.320ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 9a2b8ada-32cf-4580-84be-2cf5abe9cc03 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381722025-03-07T23:31:18.320ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 170 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 9a2b8ada-32cf-4580-84be-2cf5abe9cc03 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381732025-03-07T23:31:18.320ZINFOtest_unauthorized (external client test context): client received response status = 405
381742025-03-07T23:31:18.321ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381752025-03-07T23:31:18.321ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381762025-03-07T23:31:18.321ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 6755f24a-1d01-4aa8-a2c0-e9e2a74019a0 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381772025-03-07T23:31:18.321ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 6755f24a-1d01-4aa8-a2c0-e9e2a74019a0 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381782025-03-07T23:31:18.321ZINFOtest_unauthorized (external client test context): client received response status = 405
381792025-03-07T23:31:18.321ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
381802025-03-07T23:31:18.321ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
381812025-03-07T23:31:18.321ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381822025-03-07T23:31:18.322ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381832025-03-07T23:31:18.322ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
381842025-03-07T23:31:18.322ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381852025-03-07T23:31:18.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381862025-03-07T23:31:18.323ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381872025-03-07T23:31:18.326ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381882025-03-07T23:31:18.327ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381892025-03-07T23:31:18.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381902025-03-07T23:31:18.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
381912025-03-07T23:31:18.330ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
381922025-03-07T23:31:18.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381932025-03-07T23:31:18.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381942025-03-07T23:31:18.331ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381952025-03-07T23:31:18.336ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
381962025-03-07T23:31:18.336ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
381972025-03-07T23:31:18.336ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
381982025-03-07T23:31:18.337ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
381992025-03-07T23:31:18.340ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
382002025-03-07T23:31:18.345ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
382012025-03-07T23:31:18.345ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382022025-03-07T23:31:18.345ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382032025-03-07T23:31:18.346ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382042025-03-07T23:31:18.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
382052025-03-07T23:31:18.364ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
382062025-03-07T23:31:18.364ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382072025-03-07T23:31:18.364ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382082025-03-07T23:31:18.366ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382092025-03-07T23:31:18.369ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
382102025-03-07T23:31:18.369ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
382112025-03-07T23:31:18.369ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
382122025-03-07T23:31:18.370ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
382132025-03-07T23:31:18.372ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
382142025-03-07T23:31:18.377ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
382152025-03-07T23:31:18.377ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382162025-03-07T23:31:18.377ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382172025-03-07T23:31:18.378ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382182025-03-07T23:31:18.379ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382192025-03-07T23:31:18.381ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382202025-03-07T23:31:18.381ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382212025-03-07T23:31:18.382ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382222025-03-07T23:31:18.384ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382232025-03-07T23:31:18.384ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382242025-03-07T23:31:18.386ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382252025-03-07T23:31:18.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382262025-03-07T23:31:18.389ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382272025-03-07T23:31:18.389ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382282025-03-07T23:31:18.389ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382292025-03-07T23:31:18.389ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382302025-03-07T23:31:18.393ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382312025-03-07T23:31:18.393ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382322025-03-07T23:31:18.393ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382332025-03-07T23:31:18.396ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382342025-03-07T23:31:18.403ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382352025-03-07T23:31:18.403ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382362025-03-07T23:31:18.403ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382372025-03-07T23:31:18.405ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382382025-03-07T23:31:18.420ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382392025-03-07T23:31:18.459ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382402025-03-07T23:31:18.460ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 138130 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 1c229b96-3b7c-4d69-921d-6b1eec7dfa42 response_code = 404 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382412025-03-07T23:31:18.460ZINFOtest_unauthorized (external client test context): client received response status = 404
382422025-03-07T23:31:18.461ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382432025-03-07T23:31:18.461ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382442025-03-07T23:31:18.461ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 62bdf27a-0c94-43b5-87fa-381189b8dcd5 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382452025-03-07T23:31:18.461ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 62bdf27a-0c94-43b5-87fa-381189b8dcd5 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382462025-03-07T23:31:18.461ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 62bdf27a-0c94-43b5-87fa-381189b8dcd5 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382472025-03-07T23:31:18.462ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 62bdf27a-0c94-43b5-87fa-381189b8dcd5 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382482025-03-07T23:31:18.462ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 471 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 62bdf27a-0c94-43b5-87fa-381189b8dcd5 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382492025-03-07T23:31:18.462ZINFOtest_unauthorized (external client test context): client received response status = 401
382502025-03-07T23:31:18.462ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382512025-03-07T23:31:18.462ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382522025-03-07T23:31:18.462ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 18e8415b-2b7f-4b16-8765-ce44e472b97f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382532025-03-07T23:31:18.462ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 18e8415b-2b7f-4b16-8765-ce44e472b97f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382542025-03-07T23:31:18.462ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 18e8415b-2b7f-4b16-8765-ce44e472b97f uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382552025-03-07T23:31:18.463ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 317 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 18e8415b-2b7f-4b16-8765-ce44e472b97f response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382562025-03-07T23:31:18.463ZINFOtest_unauthorized (external client test context): client received response status = 401
382572025-03-07T23:31:18.463ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382582025-03-07T23:31:18.463ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382592025-03-07T23:31:18.463ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 17fa06b6-a25c-4aa5-82cf-ec2ba5fb6460 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382602025-03-07T23:31:18.463ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 17fa06b6-a25c-4aa5-82cf-ec2ba5fb6460 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382612025-03-07T23:31:18.466ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4553:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::InstanceNetworkInterface>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4570:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn_env#0}, dropshot::handler::HttpResponseCreated<omicron_common::api::external::InstanceNetworkInterface>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_create::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::InstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceCreate>), dropshot::handler::HttpResponseCreated<omicron_common::api::external::InstanceNetworkInterface>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 17fa06b6-a25c-4aa5-82cf-ec2ba5fb6460 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382622025-03-07T23:31:18.466ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2039 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 17fa06b6-a25c-4aa5-82cf-ec2ba5fb6460 response_code = 401 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382632025-03-07T23:31:18.466ZINFOtest_unauthorized (external client test context): client received response status = 401
382642025-03-07T23:31:18.466ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382652025-03-07T23:31:18.466ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382662025-03-07T23:31:18.466ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 699f25e6-7467-4a8a-9646-f486b9427539 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382672025-03-07T23:31:18.466ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 58 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 699f25e6-7467-4a8a-9646-f486b9427539 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382682025-03-07T23:31:18.466ZINFOtest_unauthorized (external client test context): client received response status = 405
382692025-03-07T23:31:18.466ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382702025-03-07T23:31:18.466ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382712025-03-07T23:31:18.467ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 72fdb1b8-3343-4cb6-abca-00e7ac535942 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382722025-03-07T23:31:18.467ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 72fdb1b8-3343-4cb6-abca-00e7ac535942 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382732025-03-07T23:31:18.468ZINFOtest_unauthorized (external client test context): client received response status = 405
382742025-03-07T23:31:18.468ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382752025-03-07T23:31:18.468ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382762025-03-07T23:31:18.468ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 5303ec14-5f6a-4119-8416-b2144c53eb30 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382772025-03-07T23:31:18.468ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 5303ec14-5f6a-4119-8416-b2144c53eb30 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382782025-03-07T23:31:18.468ZINFOtest_unauthorized (external client test context): client received response status = 405
382792025-03-07T23:31:18.468ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382802025-03-07T23:31:18.468ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382812025-03-07T23:31:18.469ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 036dec7d-f24d-4a25-9c7e-40ff83734fbf uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382822025-03-07T23:31:18.469ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 91 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 036dec7d-f24d-4a25-9c7e-40ff83734fbf response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382832025-03-07T23:31:18.469ZINFOtest_unauthorized (external client test context): client received response status = 405
382842025-03-07T23:31:18.469ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382852025-03-07T23:31:18.469ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382862025-03-07T23:31:18.469ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = ceafcbfa-055a-4ce4-9f25-cf1b59e55360 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382872025-03-07T23:31:18.469ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = ceafcbfa-055a-4ce4-9f25-cf1b59e55360 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382882025-03-07T23:31:18.470ZINFOtest_unauthorized (external client test context): client received response status = 405
382892025-03-07T23:31:18.470ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382902025-03-07T23:31:18.470ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382912025-03-07T23:31:18.470ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 5dd14993-3ef7-4bb8-84c4-94f9dbb4986e uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382922025-03-07T23:31:18.470ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 84 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 5dd14993-3ef7-4bb8-84c4-94f9dbb4986e response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382932025-03-07T23:31:18.471ZINFOtest_unauthorized (external client test context): client received response status = 405
382942025-03-07T23:31:18.471ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
382952025-03-07T23:31:18.471ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
382962025-03-07T23:31:18.471ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = b0f40981-f2ab-4044-82db-531590392163 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382972025-03-07T23:31:18.471ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = b0f40981-f2ab-4044-82db-531590392163 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
382982025-03-07T23:31:18.471ZINFOtest_unauthorized (external client test context): client received response status = 405
382992025-03-07T23:31:18.471ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/network-interfaces?project=demo-project&instance=demo-instance
383002025-03-07T23:31:18.471ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
383012025-03-07T23:31:18.472ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 9ffe8126-6eeb-40e3-ad72-c142b0af6d26 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383022025-03-07T23:31:18.472ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 9ffe8126-6eeb-40e3-ad72-c142b0af6d26 response_code = 405 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383032025-03-07T23:31:18.472ZINFOtest_unauthorized (external client test context): client received response status = 405
383042025-03-07T23:31:18.472ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/network-interfaces?project=demo-project&instance=demo-instance
383052025-03-07T23:31:18.472ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces?project=demo-project&instance=demo-instance
383062025-03-07T23:31:18.473ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383072025-03-07T23:31:18.473ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383082025-03-07T23:31:18.473ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383092025-03-07T23:31:18.473ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383102025-03-07T23:31:18.473ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383112025-03-07T23:31:18.474ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383122025-03-07T23:31:18.481ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383132025-03-07T23:31:18.481ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383142025-03-07T23:31:18.483ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383152025-03-07T23:31:18.490ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
383162025-03-07T23:31:18.491ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
383172025-03-07T23:31:18.491ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383182025-03-07T23:31:18.491ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383192025-03-07T23:31:18.492ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383202025-03-07T23:31:18.497ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
383212025-03-07T23:31:18.497ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383222025-03-07T23:31:18.497ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383232025-03-07T23:31:18.498ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383242025-03-07T23:31:18.503ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
383252025-03-07T23:31:18.509ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
383262025-03-07T23:31:18.509ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383272025-03-07T23:31:18.509ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383282025-03-07T23:31:18.510ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383292025-03-07T23:31:18.513ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
383302025-03-07T23:31:18.513ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
383312025-03-07T23:31:18.513ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383322025-03-07T23:31:18.513ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383332025-03-07T23:31:18.514ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383342025-03-07T23:31:18.517ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
383352025-03-07T23:31:18.517ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383362025-03-07T23:31:18.517ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383372025-03-07T23:31:18.518ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
383382025-03-07T23:31:18.521ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
383392025-03-07T23:31:18.538ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
383402025-03-07T23:31:18.538ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383412025-03-07T23:31:18.538ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383422025-03-07T23:31:18.538ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383432025-03-07T23:31:18.539ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383442025-03-07T23:31:18.541ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383452025-03-07T23:31:18.541ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383462025-03-07T23:31:18.542ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383472025-03-07T23:31:18.546ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383482025-03-07T23:31:18.546ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383492025-03-07T23:31:18.548ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383502025-03-07T23:31:18.550ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383512025-03-07T23:31:18.551ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383522025-03-07T23:31:18.551ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383532025-03-07T23:31:18.551ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383542025-03-07T23:31:18.555ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383552025-03-07T23:31:18.558ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383562025-03-07T23:31:18.558ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383572025-03-07T23:31:18.558ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383582025-03-07T23:31:18.559ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383592025-03-07T23:31:18.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
383602025-03-07T23:31:18.562ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383612025-03-07T23:31:18.562ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383622025-03-07T23:31:18.562ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383632025-03-07T23:31:18.563ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383642025-03-07T23:31:18.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
383652025-03-07T23:31:18.566ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383662025-03-07T23:31:18.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383672025-03-07T23:31:18.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383682025-03-07T23:31:18.579ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383692025-03-07T23:31:18.579ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383702025-03-07T23:31:18.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383712025-03-07T23:31:18.579ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383722025-03-07T23:31:18.581ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
383732025-03-07T23:31:18.582ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
383742025-03-07T23:31:18.582ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
383752025-03-07T23:31:18.582ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
383762025-03-07T23:31:18.585ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383772025-03-07T23:31:18.585ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383782025-03-07T23:31:18.585ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383792025-03-07T23:31:18.586ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383802025-03-07T23:31:18.589ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383812025-03-07T23:31:18.589ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383822025-03-07T23:31:18.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383832025-03-07T23:31:18.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383842025-03-07T23:31:18.594ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383852025-03-07T23:31:18.605ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383862025-03-07T23:31:18.606ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383872025-03-07T23:31:18.606ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 roles = RoleSet { roles: {} } uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383882025-03-07T23:31:18.606ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 resource = Database result = Ok(()) uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383892025-03-07T23:31:18.610ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 137124 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 3d2a7658-85f3-4639-adb6-338b9485cdf4 response_code = 200 uri = /v1/network-interfaces?project=demo-project&instance=demo-instance
383902025-03-07T23:31:18.610ZINFOtest_unauthorized (external client test context): client received response status = 200
383912025-03-07T23:31:18.611ZINFOtest_unauthorized: test: begin endpoint url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383922025-03-07T23:31:18.611ZINFOtest_unauthorized: test: privileged GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383932025-03-07T23:31:18.611ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383942025-03-07T23:31:18.612ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383952025-03-07T23:31:18.612ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383962025-03-07T23:31:18.612ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
383972025-03-07T23:31:18.612ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
383982025-03-07T23:31:18.613ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
383992025-03-07T23:31:18.613ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384002025-03-07T23:31:18.619ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384012025-03-07T23:31:18.619ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384022025-03-07T23:31:18.625ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384032025-03-07T23:31:18.626ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
384042025-03-07T23:31:18.626ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
384052025-03-07T23:31:18.626ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384062025-03-07T23:31:18.626ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384072025-03-07T23:31:18.628ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384082025-03-07T23:31:18.630ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
384092025-03-07T23:31:18.630ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384102025-03-07T23:31:18.630ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384112025-03-07T23:31:18.632ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384122025-03-07T23:31:18.634ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
384132025-03-07T23:31:18.639ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
384142025-03-07T23:31:18.639ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384152025-03-07T23:31:18.639ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384162025-03-07T23:31:18.641ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384172025-03-07T23:31:18.643ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
384182025-03-07T23:31:18.643ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
384192025-03-07T23:31:18.643ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384202025-03-07T23:31:18.643ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384212025-03-07T23:31:18.644ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384222025-03-07T23:31:18.647ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
384232025-03-07T23:31:18.647ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384242025-03-07T23:31:18.647ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384252025-03-07T23:31:18.648ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384262025-03-07T23:31:18.650ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
384272025-03-07T23:31:18.655ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
384282025-03-07T23:31:18.655ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384292025-03-07T23:31:18.655ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384302025-03-07T23:31:18.655ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384312025-03-07T23:31:18.656ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384322025-03-07T23:31:18.659ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384332025-03-07T23:31:18.659ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384342025-03-07T23:31:18.660ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384352025-03-07T23:31:18.678ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384362025-03-07T23:31:18.678ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384372025-03-07T23:31:18.679ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384382025-03-07T23:31:18.684ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384392025-03-07T23:31:18.684ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384402025-03-07T23:31:18.685ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384412025-03-07T23:31:18.693ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384422025-03-07T23:31:18.693ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384432025-03-07T23:31:18.693ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384442025-03-07T23:31:18.693ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384452025-03-07T23:31:18.696ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384462025-03-07T23:31:18.700ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384472025-03-07T23:31:18.700ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384482025-03-07T23:31:18.700ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384492025-03-07T23:31:18.701ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384502025-03-07T23:31:18.705ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384512025-03-07T23:31:18.705ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384522025-03-07T23:31:18.705ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384532025-03-07T23:31:18.705ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384542025-03-07T23:31:18.709ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384552025-03-07T23:31:18.723ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384562025-03-07T23:31:18.725ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 111843 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d5a908bb-cbb5-4352-a2aa-6fcb066a2651 response_code = 200 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384572025-03-07T23:31:18.725ZINFOtest_unauthorized (external client test context): client received response status = 200
384582025-03-07T23:31:18.725ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384592025-03-07T23:31:18.725ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384602025-03-07T23:31:18.725ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384612025-03-07T23:31:18.725ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384622025-03-07T23:31:18.725ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384632025-03-07T23:31:18.725ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384642025-03-07T23:31:18.726ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384652025-03-07T23:31:18.726ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384662025-03-07T23:31:18.733ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384672025-03-07T23:31:18.733ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384682025-03-07T23:31:18.734ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384692025-03-07T23:31:18.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
384702025-03-07T23:31:18.740ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
384712025-03-07T23:31:18.740ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384722025-03-07T23:31:18.740ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384732025-03-07T23:31:18.741ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384742025-03-07T23:31:18.748ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
384752025-03-07T23:31:18.748ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384762025-03-07T23:31:18.748ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384772025-03-07T23:31:18.750ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384782025-03-07T23:31:18.752ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
384792025-03-07T23:31:18.755ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
384802025-03-07T23:31:18.756ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384812025-03-07T23:31:18.756ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384822025-03-07T23:31:18.757ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384832025-03-07T23:31:18.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
384842025-03-07T23:31:18.768ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
384852025-03-07T23:31:18.768ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384862025-03-07T23:31:18.768ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384872025-03-07T23:31:18.769ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384882025-03-07T23:31:18.778ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
384892025-03-07T23:31:18.778ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
384902025-03-07T23:31:18.778ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
384912025-03-07T23:31:18.779ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
384922025-03-07T23:31:18.784ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
384932025-03-07T23:31:18.788ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
384942025-03-07T23:31:18.789ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384952025-03-07T23:31:18.789ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384962025-03-07T23:31:18.789ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384972025-03-07T23:31:18.790ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384982025-03-07T23:31:18.794ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
384992025-03-07T23:31:18.794ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385002025-03-07T23:31:18.794ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385012025-03-07T23:31:18.797ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385022025-03-07T23:31:18.797ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385032025-03-07T23:31:18.797ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385042025-03-07T23:31:18.807ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385052025-03-07T23:31:18.807ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385062025-03-07T23:31:18.808ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385072025-03-07T23:31:18.818ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385082025-03-07T23:31:18.818ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385092025-03-07T23:31:18.818ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385102025-03-07T23:31:18.818ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385112025-03-07T23:31:18.819ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385122025-03-07T23:31:18.825ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385132025-03-07T23:31:18.832ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385142025-03-07T23:31:18.832ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385152025-03-07T23:31:18.833ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385162025-03-07T23:31:18.840ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385172025-03-07T23:31:18.840ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385182025-03-07T23:31:18.840ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385192025-03-07T23:31:18.841ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385202025-03-07T23:31:18.871ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385212025-03-07T23:31:18.893ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } result = Err(ObjectNotFound { type_name: InstanceNetworkInterface, lookup_type: ByName("net0") }) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385222025-03-07T23:31:18.893ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance-network-interface with name "net0" error_message_internal = not found: instance-network-interface with name "net0" latency_us = 168276 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 24cb8d1d-2adf-45b5-aeb6-729738d5c418 response_code = 404 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385232025-03-07T23:31:18.894ZINFOtest_unauthorized (external client test context): client received response status = 404
385242025-03-07T23:31:18.894ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385252025-03-07T23:31:18.894ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385262025-03-07T23:31:18.895ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = eee88ab2-5d26-4d4e-91ea-9df02d4f2c40 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385272025-03-07T23:31:18.895ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = eee88ab2-5d26-4d4e-91ea-9df02d4f2c40 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385282025-03-07T23:31:18.895ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = eee88ab2-5d26-4d4e-91ea-9df02d4f2c40 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385292025-03-07T23:31:18.895ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = eee88ab2-5d26-4d4e-91ea-9df02d4f2c40 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385302025-03-07T23:31:18.895ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 591 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = eee88ab2-5d26-4d4e-91ea-9df02d4f2c40 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385312025-03-07T23:31:18.896ZINFOtest_unauthorized (external client test context): client received response status = 401
385322025-03-07T23:31:18.896ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385332025-03-07T23:31:18.896ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385342025-03-07T23:31:18.896ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8cf59085-20c7-4314-9b4c-b9613df5855a uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385352025-03-07T23:31:18.896ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8cf59085-20c7-4314-9b4c-b9613df5855a uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385362025-03-07T23:31:18.896ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8cf59085-20c7-4314-9b4c-b9613df5855a uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385372025-03-07T23:31:18.896ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 234 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8cf59085-20c7-4314-9b4c-b9613df5855a response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385382025-03-07T23:31:18.896ZINFOtest_unauthorized (external client test context): client received response status = 401
385392025-03-07T23:31:18.897ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385402025-03-07T23:31:18.897ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385412025-03-07T23:31:18.898ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d18e3b34-0c9c-4a8d-ab26-56b1d4aaed07 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385422025-03-07T23:31:18.898ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d18e3b34-0c9c-4a8d-ab26-56b1d4aaed07 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385432025-03-07T23:31:18.901ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4614:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4633:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_view::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>), dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d18e3b34-0c9c-4a8d-ab26-56b1d4aaed07 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385442025-03-07T23:31:18.901ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 3382 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = d18e3b34-0c9c-4a8d-ab26-56b1d4aaed07 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385452025-03-07T23:31:18.901ZINFOtest_unauthorized (external client test context): client received response status = 401
385462025-03-07T23:31:18.902ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385472025-03-07T23:31:18.902ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385482025-03-07T23:31:18.902ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385492025-03-07T23:31:18.902ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385502025-03-07T23:31:18.902ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385512025-03-07T23:31:18.902ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385522025-03-07T23:31:18.902ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385532025-03-07T23:31:18.903ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385542025-03-07T23:31:18.907ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385552025-03-07T23:31:18.907ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385562025-03-07T23:31:18.908ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385572025-03-07T23:31:18.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
385582025-03-07T23:31:18.912ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
385592025-03-07T23:31:18.912ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385602025-03-07T23:31:18.913ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385612025-03-07T23:31:18.914ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385622025-03-07T23:31:18.918ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
385632025-03-07T23:31:18.918ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385642025-03-07T23:31:18.918ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385652025-03-07T23:31:18.918ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385662025-03-07T23:31:18.921ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
385672025-03-07T23:31:18.938ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
385682025-03-07T23:31:18.938ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385692025-03-07T23:31:18.938ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385702025-03-07T23:31:18.940ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385712025-03-07T23:31:18.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
385722025-03-07T23:31:18.945ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
385732025-03-07T23:31:18.945ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385742025-03-07T23:31:18.945ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385752025-03-07T23:31:18.945ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385762025-03-07T23:31:18.957ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
385772025-03-07T23:31:18.958ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
385782025-03-07T23:31:18.958ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
385792025-03-07T23:31:18.959ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
385802025-03-07T23:31:18.962ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
385812025-03-07T23:31:18.966ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
385822025-03-07T23:31:18.976ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385832025-03-07T23:31:18.976ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385842025-03-07T23:31:18.976ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385852025-03-07T23:31:18.989ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385862025-03-07T23:31:18.992ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385872025-03-07T23:31:18.992ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385882025-03-07T23:31:18.994ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385892025-03-07T23:31:19.006ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385902025-03-07T23:31:19.006ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385912025-03-07T23:31:19.007ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385922025-03-07T23:31:19.022ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385932025-03-07T23:31:19.022ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385942025-03-07T23:31:19.023ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385952025-03-07T23:31:19.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385962025-03-07T23:31:19.029ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385972025-03-07T23:31:19.029ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385982025-03-07T23:31:19.029ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
385992025-03-07T23:31:19.030ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386002025-03-07T23:31:19.034ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386012025-03-07T23:31:19.034ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386022025-03-07T23:31:19.034ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386032025-03-07T23:31:19.036ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386042025-03-07T23:31:19.047ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386052025-03-07T23:31:19.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386062025-03-07T23:31:19.047ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386072025-03-07T23:31:19.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386082025-03-07T23:31:19.054ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386092025-03-07T23:31:19.090ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } result = Err(ObjectNotFound { type_name: InstanceNetworkInterface, lookup_type: ByName("net0") }) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386102025-03-07T23:31:19.091ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance-network-interface with name "net0" error_message_internal = not found: instance-network-interface with name "net0" latency_us = 188966 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 97cf2455-64e3-4526-85b5-ebf37938d410 response_code = 404 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386112025-03-07T23:31:19.092ZINFOtest_unauthorized (external client test context): client received response status = 404
386122025-03-07T23:31:19.092ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386132025-03-07T23:31:19.092ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386142025-03-07T23:31:19.093ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = a8b12b04-2f0a-4e43-819f-d0023cc95bcd uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386152025-03-07T23:31:19.093ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = a8b12b04-2f0a-4e43-819f-d0023cc95bcd uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386162025-03-07T23:31:19.093ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = a8b12b04-2f0a-4e43-819f-d0023cc95bcd uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386172025-03-07T23:31:19.093ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = a8b12b04-2f0a-4e43-819f-d0023cc95bcd uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386182025-03-07T23:31:19.094ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 1020 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = a8b12b04-2f0a-4e43-819f-d0023cc95bcd response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386192025-03-07T23:31:19.094ZINFOtest_unauthorized (external client test context): client received response status = 401
386202025-03-07T23:31:19.094ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386212025-03-07T23:31:19.095ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386222025-03-07T23:31:19.095ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 3a0dc112-16d3-42e7-95ce-648a555d1835 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386232025-03-07T23:31:19.095ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 3a0dc112-16d3-42e7-95ce-648a555d1835 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386242025-03-07T23:31:19.095ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 3a0dc112-16d3-42e7-95ce-648a555d1835 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386252025-03-07T23:31:19.096ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 523 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 3a0dc112-16d3-42e7-95ce-648a555d1835 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386262025-03-07T23:31:19.096ZINFOtest_unauthorized (external client test context): client received response status = 401
386272025-03-07T23:31:19.096ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386282025-03-07T23:31:19.097ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386292025-03-07T23:31:19.097ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 5b819dce-2ecb-46e2-a4ee-934b09cabf91 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386302025-03-07T23:31:19.097ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 5b819dce-2ecb-46e2-a4ee-934b09cabf91 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386312025-03-07T23:31:19.099ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4645:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4674:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn_env#0}, dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_update::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::InstanceNetworkInterfaceUpdate>), dropshot::handler::HttpResponseOk<omicron_common::api::external::InstanceNetworkInterface>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 5b819dce-2ecb-46e2-a4ee-934b09cabf91 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386322025-03-07T23:31:19.100ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 2663 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 5b819dce-2ecb-46e2-a4ee-934b09cabf91 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386332025-03-07T23:31:19.100ZINFOtest_unauthorized (external client test context): client received response status = 401
386342025-03-07T23:31:19.100ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386352025-03-07T23:31:19.100ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386362025-03-07T23:31:19.101ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 0579ab83-3ff2-4c53-a3c8-98b3e725ceb2 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386372025-03-07T23:31:19.101ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 165 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 0579ab83-3ff2-4c53-a3c8-98b3e725ceb2 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386382025-03-07T23:31:19.101ZINFOtest_unauthorized (external client test context): client received response status = 405
386392025-03-07T23:31:19.101ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386402025-03-07T23:31:19.102ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386412025-03-07T23:31:19.102ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 961f42fd-7dc6-4741-87fa-71729752a32f uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386422025-03-07T23:31:19.103ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 264 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 961f42fd-7dc6-4741-87fa-71729752a32f response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386432025-03-07T23:31:19.103ZINFOtest_unauthorized (external client test context): client received response status = 405
386442025-03-07T23:31:19.103ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386452025-03-07T23:31:19.103ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386462025-03-07T23:31:19.104ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 3f8f216c-821b-4040-8b2c-8ac22615ce37 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386472025-03-07T23:31:19.104ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 161 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 3f8f216c-821b-4040-8b2c-8ac22615ce37 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386482025-03-07T23:31:19.104ZINFOtest_unauthorized (external client test context): client received response status = 405
386492025-03-07T23:31:19.104ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386502025-03-07T23:31:19.105ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386512025-03-07T23:31:19.105ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 398e9ab9-19be-4e4c-85d8-5ef98d9a5573 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386522025-03-07T23:31:19.105ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 217 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 398e9ab9-19be-4e4c-85d8-5ef98d9a5573 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386532025-03-07T23:31:19.106ZINFOtest_unauthorized (external client test context): client received response status = 405
386542025-03-07T23:31:19.106ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386552025-03-07T23:31:19.106ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386562025-03-07T23:31:19.107ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386572025-03-07T23:31:19.107ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386582025-03-07T23:31:19.107ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386592025-03-07T23:31:19.107ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386602025-03-07T23:31:19.107ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386612025-03-07T23:31:19.108ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386622025-03-07T23:31:19.113ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386632025-03-07T23:31:19.113ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386642025-03-07T23:31:19.114ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386652025-03-07T23:31:19.119ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
386662025-03-07T23:31:19.119ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
386672025-03-07T23:31:19.119ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386682025-03-07T23:31:19.119ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386692025-03-07T23:31:19.119ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386702025-03-07T23:31:19.122ZDEBGtest_unauthorized (MgsClient): client request background_task = nat_v4_garbage_collector body = None method = GET uri = http://[::1]:12225/local/switch-id
386712025-03-07T23:31:19.122ZDEBGtest_unauthorized (MgsClient): client response background_task = nat_v4_garbage_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:12225/local/switch-id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
386722025-03-07T23:31:19.122ZWARNtest_unauthorized (BackgroundTasks): failed to identify switch slot for dendrite, will retry in 2 seconds background_task = nat_v4_garbage_collector reason = Communication Error: error sending request for url (http://[::1]:12225/local/switch-id): client error (Connect): tcp connect error: Connection refused (os error 146): Connection refused (os error 146) zone_address = ::1
386732025-03-07T23:31:19.127ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
386742025-03-07T23:31:19.128ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386752025-03-07T23:31:19.128ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386762025-03-07T23:31:19.129ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386772025-03-07T23:31:19.132ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
386782025-03-07T23:31:19.136ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
386792025-03-07T23:31:19.136ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386802025-03-07T23:31:19.136ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386812025-03-07T23:31:19.137ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386822025-03-07T23:31:19.140ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
386832025-03-07T23:31:19.140ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
386842025-03-07T23:31:19.140ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386852025-03-07T23:31:19.140ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386862025-03-07T23:31:19.140ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386872025-03-07T23:31:19.143ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
386882025-03-07T23:31:19.143ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
386892025-03-07T23:31:19.143ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
386902025-03-07T23:31:19.144ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
386912025-03-07T23:31:19.148ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
386922025-03-07T23:31:19.156ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
386932025-03-07T23:31:19.156ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386942025-03-07T23:31:19.156ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386952025-03-07T23:31:19.156ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386962025-03-07T23:31:19.157ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
386972025-03-07T23:31:19.157ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
386982025-03-07T23:31:19.157ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
386992025-03-07T23:31:19.157ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
387002025-03-07T23:31:19.158ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
387012025-03-07T23:31:19.160ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387022025-03-07T23:31:19.160ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387032025-03-07T23:31:19.161ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387042025-03-07T23:31:19.163ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
387052025-03-07T23:31:19.163ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
387062025-03-07T23:31:19.163ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387072025-03-07T23:31:19.164ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387082025-03-07T23:31:19.165ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387092025-03-07T23:31:19.166ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
387102025-03-07T23:31:19.166ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
387112025-03-07T23:31:19.168ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387122025-03-07T23:31:19.168ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387132025-03-07T23:31:19.169ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387142025-03-07T23:31:19.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387152025-03-07T23:31:19.172ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387162025-03-07T23:31:19.172ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387172025-03-07T23:31:19.172ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387182025-03-07T23:31:19.173ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387192025-03-07T23:31:19.177ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387202025-03-07T23:31:19.177ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387212025-03-07T23:31:19.177ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387222025-03-07T23:31:19.177ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387232025-03-07T23:31:19.180ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387242025-03-07T23:31:19.180ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387252025-03-07T23:31:19.180ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387262025-03-07T23:31:19.181ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387272025-03-07T23:31:19.188ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387282025-03-07T23:31:19.215ZDEBGtest_unauthorized (dropshot_external): authorize result action = Delete actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } result = Err(ObjectNotFound { type_name: InstanceNetworkInterface, lookup_type: ByName("net0") }) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387292025-03-07T23:31:19.215ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance-network-interface with name "net0" error_message_internal = not found: instance-network-interface with name "net0" latency_us = 108720 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = c6142a82-379b-4de8-82d3-19cd1a6745f9 response_code = 404 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387302025-03-07T23:31:19.216ZINFOtest_unauthorized (external client test context): client received response status = 404
387312025-03-07T23:31:19.216ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387322025-03-07T23:31:19.216ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387332025-03-07T23:31:19.216ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ad2498dc-0394-40df-b2e8-7d4180ecc2a3 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387342025-03-07T23:31:19.216ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ad2498dc-0394-40df-b2e8-7d4180ecc2a3 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387352025-03-07T23:31:19.216ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ad2498dc-0394-40df-b2e8-7d4180ecc2a3 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387362025-03-07T23:31:19.216ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ad2498dc-0394-40df-b2e8-7d4180ecc2a3 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387372025-03-07T23:31:19.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 668 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ad2498dc-0394-40df-b2e8-7d4180ecc2a3 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387382025-03-07T23:31:19.217ZINFOtest_unauthorized (external client test context): client received response status = 401
387392025-03-07T23:31:19.217ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387402025-03-07T23:31:19.217ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387412025-03-07T23:31:19.217ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ac2509b8-fbff-4928-bc3e-216b8d094a22 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387422025-03-07T23:31:19.217ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ac2509b8-fbff-4928-bc3e-216b8d094a22 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387432025-03-07T23:31:19.217ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ac2509b8-fbff-4928-bc3e-216b8d094a22 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387442025-03-07T23:31:19.217ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 179 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = ac2509b8-fbff-4928-bc3e-216b8d094a22 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387452025-03-07T23:31:19.218ZINFOtest_unauthorized (external client test context): client received response status = 401
387462025-03-07T23:31:19.218ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387472025-03-07T23:31:19.218ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387482025-03-07T23:31:19.218ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 94d630a5-e6e9-4d99-9a99-1a9513aec408 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387492025-03-07T23:31:19.219ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 94d630a5-e6e9-4d99-9a99-1a9513aec408 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387502025-03-07T23:31:19.225ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4581:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4603:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_network_interface_delete::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::NetworkInterfacePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalInstanceSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 94d630a5-e6e9-4d99-9a99-1a9513aec408 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387512025-03-07T23:31:19.225ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 6943 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 94d630a5-e6e9-4d99-9a99-1a9513aec408 response_code = 401 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387522025-03-07T23:31:19.225ZINFOtest_unauthorized (external client test context): client received response status = 401
387532025-03-07T23:31:19.229ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387542025-03-07T23:31:19.229ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387552025-03-07T23:31:19.230ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = e1f6ca7d-3482-4630-9f3c-1baa5691b68b uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387562025-03-07T23:31:19.230ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 189 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = e1f6ca7d-3482-4630-9f3c-1baa5691b68b response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387572025-03-07T23:31:19.230ZINFOtest_unauthorized (external client test context): client received response status = 405
387582025-03-07T23:31:19.231ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387592025-03-07T23:31:19.231ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387602025-03-07T23:31:19.231ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 30675eed-e44c-4438-a259-6170bb69d03c uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387612025-03-07T23:31:19.231ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 178 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 30675eed-e44c-4438-a259-6170bb69d03c response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387622025-03-07T23:31:19.232ZINFOtest_unauthorized (external client test context): client received response status = 405
387632025-03-07T23:31:19.232ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387642025-03-07T23:31:19.232ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387652025-03-07T23:31:19.233ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = db0fb487-7f75-4f8b-99fc-e3e9720b5d27 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387662025-03-07T23:31:19.233ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 191 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = db0fb487-7f75-4f8b-99fc-e3e9720b5d27 response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387672025-03-07T23:31:19.233ZINFOtest_unauthorized (external client test context): client received response status = 405
387682025-03-07T23:31:19.234ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387692025-03-07T23:31:19.234ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387702025-03-07T23:31:19.234ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = f7685260-6d23-45c7-82b2-99a7dee86f8f uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387712025-03-07T23:31:19.236ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 1073 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = f7685260-6d23-45c7-82b2-99a7dee86f8f response_code = 405 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387722025-03-07T23:31:19.236ZINFOtest_unauthorized (external client test context): client received response status = 405
387732025-03-07T23:31:19.236ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387742025-03-07T23:31:19.236ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387752025-03-07T23:31:19.236ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387762025-03-07T23:31:19.236ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387772025-03-07T23:31:19.236ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
387782025-03-07T23:31:19.236ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387792025-03-07T23:31:19.236ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387802025-03-07T23:31:19.237ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387812025-03-07T23:31:19.239ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387822025-03-07T23:31:19.239ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387832025-03-07T23:31:19.240ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387842025-03-07T23:31:19.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
387852025-03-07T23:31:19.243ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
387862025-03-07T23:31:19.243ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387872025-03-07T23:31:19.243ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387882025-03-07T23:31:19.244ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387892025-03-07T23:31:19.246ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
387902025-03-07T23:31:19.246ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387912025-03-07T23:31:19.247ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387922025-03-07T23:31:19.247ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387932025-03-07T23:31:19.249ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
387942025-03-07T23:31:19.253ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
387952025-03-07T23:31:19.253ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
387962025-03-07T23:31:19.253ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
387972025-03-07T23:31:19.253ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
387982025-03-07T23:31:19.256ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
387992025-03-07T23:31:19.256ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
388002025-03-07T23:31:19.256ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388012025-03-07T23:31:19.257ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388022025-03-07T23:31:19.257ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388032025-03-07T23:31:19.259ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
388042025-03-07T23:31:19.259ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
388052025-03-07T23:31:19.259ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388062025-03-07T23:31:19.259ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388072025-03-07T23:31:19.259ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388082025-03-07T23:31:19.261ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
388092025-03-07T23:31:19.266ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
388102025-03-07T23:31:19.266ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388112025-03-07T23:31:19.266ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388122025-03-07T23:31:19.266ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388132025-03-07T23:31:19.266ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388142025-03-07T23:31:19.267ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388152025-03-07T23:31:19.267ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388162025-03-07T23:31:19.268ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388172025-03-07T23:31:19.271ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388182025-03-07T23:31:19.271ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388192025-03-07T23:31:19.272ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388202025-03-07T23:31:19.274ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388212025-03-07T23:31:19.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388222025-03-07T23:31:19.275ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388232025-03-07T23:31:19.278ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388242025-03-07T23:31:19.278ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388252025-03-07T23:31:19.278ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388262025-03-07T23:31:19.278ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388272025-03-07T23:31:19.279ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388282025-03-07T23:31:19.282ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388292025-03-07T23:31:19.282ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388302025-03-07T23:31:19.282ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388312025-03-07T23:31:19.283ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388322025-03-07T23:31:19.286ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388332025-03-07T23:31:19.290ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388342025-03-07T23:31:19.290ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388352025-03-07T23:31:19.291ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = Database result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388362025-03-07T23:31:19.294ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388372025-03-07T23:31:19.310ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 resource = InstanceNetworkInterface { parent: Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") }, key: 0fcc6e68-2b3c-4425-8a77-8e849b2f2d6b, lookup_type: ByName("net0") } result = Ok(()) uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388382025-03-07T23:31:19.310ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 74269 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 91d53b57-ad07-411d-8af3-f75c17edf8a7 response_code = 200 uri = /v1/network-interfaces/net0?project=demo-project&instance=demo-instance
388392025-03-07T23:31:19.311ZINFOtest_unauthorized (external client test context): client received response status = 200
388402025-03-07T23:31:19.311ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/external-ips?project=demo-project
388412025-03-07T23:31:19.311ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance/external-ips?project=demo-project
388422025-03-07T23:31:19.311ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
388432025-03-07T23:31:19.311ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e uri = /v1/instances/demo-instance/external-ips?project=demo-project
388442025-03-07T23:31:19.312ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e uri = /v1/instances/demo-instance/external-ips?project=demo-project
388452025-03-07T23:31:19.312ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/external-ips?project=demo-project
388462025-03-07T23:31:19.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388472025-03-07T23:31:19.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388482025-03-07T23:31:19.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388492025-03-07T23:31:19.315ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388502025-03-07T23:31:19.315ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388512025-03-07T23:31:19.315ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388522025-03-07T23:31:19.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
388532025-03-07T23:31:19.318ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
388542025-03-07T23:31:19.318ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388552025-03-07T23:31:19.318ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388562025-03-07T23:31:19.319ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388572025-03-07T23:31:19.321ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
388582025-03-07T23:31:19.321ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388592025-03-07T23:31:19.321ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388602025-03-07T23:31:19.322ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388612025-03-07T23:31:19.324ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
388622025-03-07T23:31:19.327ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
388632025-03-07T23:31:19.327ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388642025-03-07T23:31:19.327ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388652025-03-07T23:31:19.328ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388662025-03-07T23:31:19.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
388672025-03-07T23:31:19.330ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
388682025-03-07T23:31:19.330ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388692025-03-07T23:31:19.330ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388702025-03-07T23:31:19.330ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388712025-03-07T23:31:19.332ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
388722025-03-07T23:31:19.332ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
388732025-03-07T23:31:19.332ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
388742025-03-07T23:31:19.333ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
388752025-03-07T23:31:19.335ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
388762025-03-07T23:31:19.338ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
388772025-03-07T23:31:19.338ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e uri = /v1/instances/demo-instance/external-ips?project=demo-project
388782025-03-07T23:31:19.338ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388792025-03-07T23:31:19.338ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388802025-03-07T23:31:19.339ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388812025-03-07T23:31:19.342ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388822025-03-07T23:31:19.342ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388832025-03-07T23:31:19.342ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388842025-03-07T23:31:19.346ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388852025-03-07T23:31:19.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388862025-03-07T23:31:19.347ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388872025-03-07T23:31:19.349ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388882025-03-07T23:31:19.349ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/external-ips?project=demo-project
388892025-03-07T23:31:19.349ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388902025-03-07T23:31:19.349ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388912025-03-07T23:31:19.350ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388922025-03-07T23:31:19.353ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips?project=demo-project
388932025-03-07T23:31:19.354ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388942025-03-07T23:31:19.354ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388952025-03-07T23:31:19.354ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
388962025-03-07T23:31:19.357ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips?project=demo-project
388972025-03-07T23:31:19.358ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
388982025-03-07T23:31:19.358ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
388992025-03-07T23:31:19.358ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389002025-03-07T23:31:19.362ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389012025-03-07T23:31:19.380ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389022025-03-07T23:31:19.380ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389032025-03-07T23:31:19.380ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389042025-03-07T23:31:19.381ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389052025-03-07T23:31:19.387ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 75201 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = e9e3af13-4de9-423b-93f8-481ce625a22e response_code = 200 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389062025-03-07T23:31:19.387ZINFOtest_unauthorized (external client test context): client received response status = 200
389072025-03-07T23:31:19.387ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
389082025-03-07T23:31:19.387ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
389092025-03-07T23:31:19.387ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c uri = /v1/instances/demo-instance/external-ips?project=demo-project
389102025-03-07T23:31:19.388ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c uri = /v1/instances/demo-instance/external-ips?project=demo-project
389112025-03-07T23:31:19.388ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389122025-03-07T23:31:19.388ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389132025-03-07T23:31:19.388ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389142025-03-07T23:31:19.389ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389152025-03-07T23:31:19.392ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389162025-03-07T23:31:19.392ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389172025-03-07T23:31:19.396ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389182025-03-07T23:31:19.398ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
389192025-03-07T23:31:19.398ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
389202025-03-07T23:31:19.399ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389212025-03-07T23:31:19.399ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389222025-03-07T23:31:19.399ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389232025-03-07T23:31:19.410ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:562
389242025-03-07T23:31:19.412ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
389252025-03-07T23:31:19.412ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
389262025-03-07T23:31:19.412ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389272025-03-07T23:31:19.412ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389282025-03-07T23:31:19.412ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389292025-03-07T23:31:19.413ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 65f55cd6-c8ba-4a0c-b5bc-0b493b1959f5 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
389302025-03-07T23:31:19.413ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 65f55cd6-c8ba-4a0c-b5bc-0b493b1959f5 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
389312025-03-07T23:31:19.413ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 65f55cd6-c8ba-4a0c-b5bc-0b493b1959f5 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
389322025-03-07T23:31:19.414ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 65f55cd6-c8ba-4a0c-b5bc-0b493b1959f5 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
389332025-03-07T23:31:19.417ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
389342025-03-07T23:31:19.421ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
389352025-03-07T23:31:19.421ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389362025-03-07T23:31:19.421ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389372025-03-07T23:31:19.422ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389382025-03-07T23:31:19.425ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 11774 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 65f55cd6-c8ba-4a0c-b5bc-0b493b1959f5 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
389392025-03-07T23:31:19.425ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
389402025-03-07T23:31:19.425ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
389412025-03-07T23:31:19.426ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389422025-03-07T23:31:19.426ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389432025-03-07T23:31:19.427ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389442025-03-07T23:31:19.428ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "65f55cd6-c8ba-4a0c-b5bc-0b493b1959f5", "content-length": "405", "date": "Fri, 07 Mar 2025 23:31:19 GMT"} })
389452025-03-07T23:31:19.428ZDEBGtest_unauthorized (oximeter): client request body = None method = GET uri = http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
389462025-03-07T23:31:19.429ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2f618585-2868-4eda-b6d9-5b46cfd0ab7e uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
389472025-03-07T23:31:19.429ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2f618585-2868-4eda-b6d9-5b46cfd0ab7e resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
389482025-03-07T23:31:19.429ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2f618585-2868-4eda-b6d9-5b46cfd0ab7e roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
389492025-03-07T23:31:19.430ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2f618585-2868-4eda-b6d9-5b46cfd0ab7e resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
389502025-03-07T23:31:19.431ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
389512025-03-07T23:31:19.431ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
389522025-03-07T23:31:19.431ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
389532025-03-07T23:31:19.433ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
389542025-03-07T23:31:19.438ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
389552025-03-07T23:31:19.442ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
389562025-03-07T23:31:19.442ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c uri = /v1/instances/demo-instance/external-ips?project=demo-project
389572025-03-07T23:31:19.442ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389582025-03-07T23:31:19.443ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389592025-03-07T23:31:19.444ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389602025-03-07T23:31:19.444ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 15382 local_addr = 127.0.0.1:34193 method = GET remote_addr = 127.0.0.1:57373 req_id = 2f618585-2868-4eda-b6d9-5b46cfd0ab7e response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
389612025-03-07T23:31:19.445ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:34193/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "2f618585-2868-4eda-b6d9-5b46cfd0ab7e", "content-length": "29", "date": "Fri, 07 Mar 2025 23:31:19 GMT"} })
389622025-03-07T23:31:19.445ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 2d8d1c15-8782-4d4a-a8ba-3818fa1c29af
389632025-03-07T23:31:19.446ZTRACtest_unauthorized (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
389642025-03-07T23:31:19.446ZINFOtest_unauthorized (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:637 n_current_tasks = 2 n_pruned_tasks = 0
389652025-03-07T23:31:19.448ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389662025-03-07T23:31:19.448ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389672025-03-07T23:31:19.449ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389682025-03-07T23:31:19.451ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389692025-03-07T23:31:19.451ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389702025-03-07T23:31:19.451ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389712025-03-07T23:31:19.455ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389722025-03-07T23:31:19.456ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/external-ips?project=demo-project
389732025-03-07T23:31:19.456ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389742025-03-07T23:31:19.456ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389752025-03-07T23:31:19.457ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389762025-03-07T23:31:19.460ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips?project=demo-project
389772025-03-07T23:31:19.460ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389782025-03-07T23:31:19.460ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389792025-03-07T23:31:19.461ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389802025-03-07T23:31:19.464ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips?project=demo-project
389812025-03-07T23:31:19.464ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
389822025-03-07T23:31:19.465ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389832025-03-07T23:31:19.465ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389842025-03-07T23:31:19.468ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
389852025-03-07T23:31:19.492ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/external-ips?project=demo-project
389862025-03-07T23:31:19.493ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 105547 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 6b98c4c8-15b9-41fc-bcef-5b6ef24ef45c response_code = 404 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389872025-03-07T23:31:19.494ZINFOtest_unauthorized (external client test context): client received response status = 404
389882025-03-07T23:31:19.495ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
389892025-03-07T23:31:19.495ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
389902025-03-07T23:31:19.495ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = f3b79df8-281e-49d2-9300-60795ee5dcf1 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389912025-03-07T23:31:19.495ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = f3b79df8-281e-49d2-9300-60795ee5dcf1 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389922025-03-07T23:31:19.495ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = f3b79df8-281e-49d2-9300-60795ee5dcf1 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389932025-03-07T23:31:19.495ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = f3b79df8-281e-49d2-9300-60795ee5dcf1 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389942025-03-07T23:31:19.495ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 381 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = f3b79df8-281e-49d2-9300-60795ee5dcf1 response_code = 401 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389952025-03-07T23:31:19.495ZINFOtest_unauthorized (external client test context): client received response status = 401
389962025-03-07T23:31:19.496ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
389972025-03-07T23:31:19.496ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
389982025-03-07T23:31:19.497ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8e075e5a-7d2d-4667-9573-3d55ed7083c0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
389992025-03-07T23:31:19.497ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8e075e5a-7d2d-4667-9573-3d55ed7083c0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390002025-03-07T23:31:19.497ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8e075e5a-7d2d-4667-9573-3d55ed7083c0 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390012025-03-07T23:31:19.497ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 240 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 8e075e5a-7d2d-4667-9573-3d55ed7083c0 response_code = 401 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390022025-03-07T23:31:19.497ZINFOtest_unauthorized (external client test context): client received response status = 401
390032025-03-07T23:31:19.497ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/external-ips?project=demo-project
390042025-03-07T23:31:19.497ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390052025-03-07T23:31:19.497ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = a019eb76-58c6-4dda-ae2c-87436b37bc3c uri = /v1/instances/demo-instance/external-ips?project=demo-project
390062025-03-07T23:31:19.497ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = a019eb76-58c6-4dda-ae2c-87436b37bc3c uri = /v1/instances/demo-instance/external-ips?project=demo-project
390072025-03-07T23:31:19.499ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4690:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::ExternalIp>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4706:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::ExternalIp>>, dropshot::error::HttpError, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_external_ip_list::{async_fn_env#0}, (dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::ExternalIp>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = a019eb76-58c6-4dda-ae2c-87436b37bc3c uri = /v1/instances/demo-instance/external-ips?project=demo-project
390082025-03-07T23:31:19.499ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1031 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = a019eb76-58c6-4dda-ae2c-87436b37bc3c response_code = 401 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390092025-03-07T23:31:19.499ZINFOtest_unauthorized (external client test context): client received response status = 401
390102025-03-07T23:31:19.499ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
390112025-03-07T23:31:19.499ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390122025-03-07T23:31:19.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 63ad0315-004f-431b-afe4-722771458a78 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390132025-03-07T23:31:19.499ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 109 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 63ad0315-004f-431b-afe4-722771458a78 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390142025-03-07T23:31:19.499ZINFOtest_unauthorized (external client test context): client received response status = 405
390152025-03-07T23:31:19.499ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
390162025-03-07T23:31:19.499ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390172025-03-07T23:31:19.499ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 2bea7e13-9af1-4061-a436-672060eb2e7f uri = /v1/instances/demo-instance/external-ips?project=demo-project
390182025-03-07T23:31:19.499ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 2bea7e13-9af1-4061-a436-672060eb2e7f response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390192025-03-07T23:31:19.499ZINFOtest_unauthorized (external client test context): client received response status = 405
390202025-03-07T23:31:19.499ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
390212025-03-07T23:31:19.500ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390222025-03-07T23:31:19.500ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 5104b869-7e5f-4649-b28b-ca7dc8808044 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390232025-03-07T23:31:19.500ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 69 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 5104b869-7e5f-4649-b28b-ca7dc8808044 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390242025-03-07T23:31:19.500ZINFOtest_unauthorized (external client test context): client received response status = 405
390252025-03-07T23:31:19.500ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/external-ips?project=demo-project
390262025-03-07T23:31:19.500ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390272025-03-07T23:31:19.500ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 2c362dc0-0922-425f-996b-043a41ac5026 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390282025-03-07T23:31:19.500ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 2c362dc0-0922-425f-996b-043a41ac5026 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390292025-03-07T23:31:19.501ZINFOtest_unauthorized (external client test context): client received response status = 405
390302025-03-07T23:31:19.501ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
390312025-03-07T23:31:19.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390322025-03-07T23:31:19.501ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 9e03809d-e4a7-4b34-a5f2-5199a9e80056 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390332025-03-07T23:31:19.501ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 60 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 9e03809d-e4a7-4b34-a5f2-5199a9e80056 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390342025-03-07T23:31:19.501ZINFOtest_unauthorized (external client test context): client received response status = 405
390352025-03-07T23:31:19.501ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
390362025-03-07T23:31:19.501ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390372025-03-07T23:31:19.502ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f71b4aaf-2e8e-4bd6-84a8-f8947bcc6c42 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390382025-03-07T23:31:19.502ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 158 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f71b4aaf-2e8e-4bd6-84a8-f8947bcc6c42 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390392025-03-07T23:31:19.502ZINFOtest_unauthorized (external client test context): client received response status = 405
390402025-03-07T23:31:19.502ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
390412025-03-07T23:31:19.502ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390422025-03-07T23:31:19.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 714ab15b-ff02-4f78-ad05-c14eba5435fb uri = /v1/instances/demo-instance/external-ips?project=demo-project
390432025-03-07T23:31:19.503ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 114 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 714ab15b-ff02-4f78-ad05-c14eba5435fb response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390442025-03-07T23:31:19.503ZINFOtest_unauthorized (external client test context): client received response status = 405
390452025-03-07T23:31:19.503ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/external-ips?project=demo-project
390462025-03-07T23:31:19.503ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390472025-03-07T23:31:19.503ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 12dba13d-e071-4f8f-a688-543c8d844ec6 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390482025-03-07T23:31:19.504ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 12dba13d-e071-4f8f-a688-543c8d844ec6 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390492025-03-07T23:31:19.504ZINFOtest_unauthorized (external client test context): client received response status = 405
390502025-03-07T23:31:19.504ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
390512025-03-07T23:31:19.504ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390522025-03-07T23:31:19.506ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 7619919c-0644-46ab-8170-80e7543c81ad uri = /v1/instances/demo-instance/external-ips?project=demo-project
390532025-03-07T23:31:19.506ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 61 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 7619919c-0644-46ab-8170-80e7543c81ad response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390542025-03-07T23:31:19.506ZINFOtest_unauthorized (external client test context): client received response status = 405
390552025-03-07T23:31:19.506ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
390562025-03-07T23:31:19.506ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390572025-03-07T23:31:19.506ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = a5552172-4587-4529-b858-6b1d3c8ceb93 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390582025-03-07T23:31:19.507ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 446 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = a5552172-4587-4529-b858-6b1d3c8ceb93 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390592025-03-07T23:31:19.507ZINFOtest_unauthorized (external client test context): client received response status = 405
390602025-03-07T23:31:19.507ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
390612025-03-07T23:31:19.508ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390622025-03-07T23:31:19.508ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 63bfaeea-96cd-47be-97ef-9835165059ab uri = /v1/instances/demo-instance/external-ips?project=demo-project
390632025-03-07T23:31:19.509ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 148 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 63bfaeea-96cd-47be-97ef-9835165059ab response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390642025-03-07T23:31:19.509ZINFOtest_unauthorized (external client test context): client received response status = 405
390652025-03-07T23:31:19.509ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/external-ips?project=demo-project
390662025-03-07T23:31:19.509ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390672025-03-07T23:31:19.509ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 2cde9db5-d1e1-4886-8c31-164561fccd0f uri = /v1/instances/demo-instance/external-ips?project=demo-project
390682025-03-07T23:31:19.510ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 148 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 2cde9db5-d1e1-4886-8c31-164561fccd0f response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390692025-03-07T23:31:19.510ZINFOtest_unauthorized (external client test context): client received response status = 405
390702025-03-07T23:31:19.510ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
390712025-03-07T23:31:19.510ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390722025-03-07T23:31:19.511ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = a4943298-7624-48ad-82b9-0531695734d9 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390732025-03-07T23:31:19.511ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 143 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = a4943298-7624-48ad-82b9-0531695734d9 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390742025-03-07T23:31:19.511ZINFOtest_unauthorized (external client test context): client received response status = 405
390752025-03-07T23:31:19.511ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
390762025-03-07T23:31:19.511ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390772025-03-07T23:31:19.512ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = c66b1c96-f1cf-4e8e-9e00-f0abd2a4114b uri = /v1/instances/demo-instance/external-ips?project=demo-project
390782025-03-07T23:31:19.512ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 144 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = c66b1c96-f1cf-4e8e-9e00-f0abd2a4114b response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390792025-03-07T23:31:19.512ZINFOtest_unauthorized (external client test context): client received response status = 405
390802025-03-07T23:31:19.512ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
390812025-03-07T23:31:19.512ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390822025-03-07T23:31:19.513ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 942d0013-af2a-4bab-af6a-6c78d3facff8 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390832025-03-07T23:31:19.513ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 140 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 942d0013-af2a-4bab-af6a-6c78d3facff8 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390842025-03-07T23:31:19.514ZINFOtest_unauthorized (external client test context): client received response status = 405
390852025-03-07T23:31:19.514ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/external-ips?project=demo-project
390862025-03-07T23:31:19.514ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390872025-03-07T23:31:19.515ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 074bc3d4-18bb-4bf9-8673-50f610f24252 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390882025-03-07T23:31:19.515ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 296 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 074bc3d4-18bb-4bf9-8673-50f610f24252 response_code = 405 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390892025-03-07T23:31:19.515ZINFOtest_unauthorized (external client test context): client received response status = 405
390902025-03-07T23:31:19.516ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/external-ips?project=demo-project
390912025-03-07T23:31:19.516ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips?project=demo-project
390922025-03-07T23:31:19.516ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b uri = /v1/instances/demo-instance/external-ips?project=demo-project
390932025-03-07T23:31:19.516ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b uri = /v1/instances/demo-instance/external-ips?project=demo-project
390942025-03-07T23:31:19.517ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/external-ips?project=demo-project
390952025-03-07T23:31:19.517ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390962025-03-07T23:31:19.517ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
390972025-03-07T23:31:19.519ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
390982025-03-07T23:31:19.521ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
390992025-03-07T23:31:19.521ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391002025-03-07T23:31:19.521ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391012025-03-07T23:31:19.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
391022025-03-07T23:31:19.525ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
391032025-03-07T23:31:19.525ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391042025-03-07T23:31:19.525ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391052025-03-07T23:31:19.526ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391062025-03-07T23:31:19.530ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
391072025-03-07T23:31:19.530ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391082025-03-07T23:31:19.530ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391092025-03-07T23:31:19.532ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391102025-03-07T23:31:19.534ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
391112025-03-07T23:31:19.539ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
391122025-03-07T23:31:19.539ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391132025-03-07T23:31:19.539ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391142025-03-07T23:31:19.540ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391152025-03-07T23:31:19.542ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
391162025-03-07T23:31:19.542ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
391172025-03-07T23:31:19.542ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391182025-03-07T23:31:19.542ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391192025-03-07T23:31:19.543ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391202025-03-07T23:31:19.544ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
391212025-03-07T23:31:19.544ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
391222025-03-07T23:31:19.544ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
391232025-03-07T23:31:19.545ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
391242025-03-07T23:31:19.547ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
391252025-03-07T23:31:19.553ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
391262025-03-07T23:31:19.553ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b uri = /v1/instances/demo-instance/external-ips?project=demo-project
391272025-03-07T23:31:19.553ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391282025-03-07T23:31:19.553ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391292025-03-07T23:31:19.554ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391302025-03-07T23:31:19.556ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391312025-03-07T23:31:19.556ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391322025-03-07T23:31:19.557ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391332025-03-07T23:31:19.560ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391342025-03-07T23:31:19.561ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391352025-03-07T23:31:19.561ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391362025-03-07T23:31:19.562ZDEBGtest_unauthorized (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
391372025-03-07T23:31:19.563ZDEBGtest_unauthorized (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
391382025-03-07T23:31:19.565ZTRACtest_unauthorized (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391392025-03-07T23:31:19.565ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/external-ips?project=demo-project
391402025-03-07T23:31:19.565ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391412025-03-07T23:31:19.565ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391422025-03-07T23:31:19.566ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391432025-03-07T23:31:19.566ZTRACtest_unauthorized (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
391442025-03-07T23:31:19.567ZDEBGtest_unauthorized (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
391452025-03-07T23:31:19.567ZTRACtest_unauthorized (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
391462025-03-07T23:31:19.567ZTRACtest_unauthorized (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
391472025-03-07T23:31:19.570ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips?project=demo-project
391482025-03-07T23:31:19.570ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391492025-03-07T23:31:19.570ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391502025-03-07T23:31:19.570ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391512025-03-07T23:31:19.573ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips?project=demo-project
391522025-03-07T23:31:19.574ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391532025-03-07T23:31:19.574ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391542025-03-07T23:31:19.574ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391552025-03-07T23:31:19.579ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391562025-03-07T23:31:19.589ZDEBGtest_unauthorized (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391572025-03-07T23:31:19.589ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database uri = /v1/instances/demo-instance/external-ips?project=demo-project
391582025-03-07T23:31:19.589ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips?project=demo-project
391592025-03-07T23:31:19.590ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips?project=demo-project
391602025-03-07T23:31:19.593ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 76685 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 49cbcf26-d9e1-468f-b79f-0feeef9c0d9b response_code = 200 uri = /v1/instances/demo-instance/external-ips?project=demo-project
391612025-03-07T23:31:19.593ZINFOtest_unauthorized (external client test context): client received response status = 200
391622025-03-07T23:31:19.593ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391632025-03-07T23:31:19.593ZWARNtest_unauthorized: test: skipping privileged GET (method not allowed) url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391642025-03-07T23:31:19.594ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391652025-03-07T23:31:19.594ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391662025-03-07T23:31:19.594ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ed5292b5-2ae3-4c43-85b9-1534b4f1673f uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391672025-03-07T23:31:19.594ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 87 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ed5292b5-2ae3-4c43-85b9-1534b4f1673f response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391682025-03-07T23:31:19.594ZINFOtest_unauthorized (external client test context): client received response status = 405
391692025-03-07T23:31:19.594ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391702025-03-07T23:31:19.595ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391712025-03-07T23:31:19.595ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 5a380a75-eb43-42f8-a9b8-7f537c90be69 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391722025-03-07T23:31:19.595ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 51 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 5a380a75-eb43-42f8-a9b8-7f537c90be69 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391732025-03-07T23:31:19.595ZINFOtest_unauthorized (external client test context): client received response status = 405
391742025-03-07T23:31:19.595ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391752025-03-07T23:31:19.595ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391762025-03-07T23:31:19.595ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 405af73e-fbe1-419c-b521-65e03b7c42eb uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391772025-03-07T23:31:19.595ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 56 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 405af73e-fbe1-419c-b521-65e03b7c42eb response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391782025-03-07T23:31:19.595ZINFOtest_unauthorized (external client test context): client received response status = 405
391792025-03-07T23:31:19.595ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391802025-03-07T23:31:19.595ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391812025-03-07T23:31:19.595ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 60b65450-a378-453d-a0fa-b059244a80be uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391822025-03-07T23:31:19.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 60b65450-a378-453d-a0fa-b059244a80be response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391832025-03-07T23:31:19.596ZINFOtest_unauthorized (external client test context): client received response status = 405
391842025-03-07T23:31:19.596ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391852025-03-07T23:31:19.596ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391862025-03-07T23:31:19.596ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 803ec7f0-9e25-4a9a-a738-748ed1c4bf20 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391872025-03-07T23:31:19.596ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 55 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 803ec7f0-9e25-4a9a-a738-748ed1c4bf20 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391882025-03-07T23:31:19.596ZINFOtest_unauthorized (external client test context): client received response status = 405
391892025-03-07T23:31:19.596ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391902025-03-07T23:31:19.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391912025-03-07T23:31:19.597ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 292543d8-ebbc-4dc3-8d79-d157c844172a uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391922025-03-07T23:31:19.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 292543d8-ebbc-4dc3-8d79-d157c844172a response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391932025-03-07T23:31:19.597ZINFOtest_unauthorized (external client test context): client received response status = 405
391942025-03-07T23:31:19.597ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391952025-03-07T23:31:19.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391962025-03-07T23:31:19.597ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 181091ef-ee62-4d26-8a5e-d88cb17759f5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391972025-03-07T23:31:19.597ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 63 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 181091ef-ee62-4d26-8a5e-d88cb17759f5 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
391982025-03-07T23:31:19.597ZINFOtest_unauthorized (external client test context): client received response status = 405
391992025-03-07T23:31:19.597ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392002025-03-07T23:31:19.597ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392012025-03-07T23:31:19.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = c329eb6d-79d9-4baf-876b-824617c80b66 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392022025-03-07T23:31:19.598ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 53 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = c329eb6d-79d9-4baf-876b-824617c80b66 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392032025-03-07T23:31:19.598ZINFOtest_unauthorized (external client test context): client received response status = 405
392042025-03-07T23:31:19.598ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392052025-03-07T23:31:19.598ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392062025-03-07T23:31:19.598ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392072025-03-07T23:31:19.598ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392082025-03-07T23:31:19.598ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392092025-03-07T23:31:19.599ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392102025-03-07T23:31:19.599ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392112025-03-07T23:31:19.599ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392122025-03-07T23:31:19.601ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392132025-03-07T23:31:19.601ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392142025-03-07T23:31:19.602ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392152025-03-07T23:31:19.603ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
392162025-03-07T23:31:19.604ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
392172025-03-07T23:31:19.604ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392182025-03-07T23:31:19.604ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392192025-03-07T23:31:19.604ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392202025-03-07T23:31:19.606ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
392212025-03-07T23:31:19.606ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392222025-03-07T23:31:19.606ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392232025-03-07T23:31:19.607ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392242025-03-07T23:31:19.608ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
392252025-03-07T23:31:19.611ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
392262025-03-07T23:31:19.611ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392272025-03-07T23:31:19.611ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392282025-03-07T23:31:19.612ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392292025-03-07T23:31:19.614ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
392302025-03-07T23:31:19.614ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
392312025-03-07T23:31:19.614ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392322025-03-07T23:31:19.614ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392332025-03-07T23:31:19.615ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392342025-03-07T23:31:19.617ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
392352025-03-07T23:31:19.617ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392362025-03-07T23:31:19.617ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392372025-03-07T23:31:19.618ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392382025-03-07T23:31:19.621ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
392392025-03-07T23:31:19.626ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
392402025-03-07T23:31:19.626ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392412025-03-07T23:31:19.626ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392422025-03-07T23:31:19.626ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392432025-03-07T23:31:19.627ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392442025-03-07T23:31:19.629ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392452025-03-07T23:31:19.629ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392462025-03-07T23:31:19.630ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392472025-03-07T23:31:19.632ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392482025-03-07T23:31:19.633ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392492025-03-07T23:31:19.633ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392502025-03-07T23:31:19.636ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392512025-03-07T23:31:19.636ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392522025-03-07T23:31:19.636ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392532025-03-07T23:31:19.636ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392542025-03-07T23:31:19.636ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392552025-03-07T23:31:19.641ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392562025-03-07T23:31:19.641ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392572025-03-07T23:31:19.641ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392582025-03-07T23:31:19.642ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392592025-03-07T23:31:19.645ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392602025-03-07T23:31:19.645ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392612025-03-07T23:31:19.645ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392622025-03-07T23:31:19.646ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392632025-03-07T23:31:19.650ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392642025-03-07T23:31:19.676ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392652025-03-07T23:31:19.676ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 78279 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 64ac87f6-1f92-4f68-aed9-c0bb087e1636 response_code = 404 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392662025-03-07T23:31:19.677ZINFOtest_unauthorized (external client test context): client received response status = 404
392672025-03-07T23:31:19.677ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392682025-03-07T23:31:19.677ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392692025-03-07T23:31:19.678ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 7d0aed69-c965-479d-ac68-e398d857d505 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392702025-03-07T23:31:19.678ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 7d0aed69-c965-479d-ac68-e398d857d505 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392712025-03-07T23:31:19.678ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 7d0aed69-c965-479d-ac68-e398d857d505 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392722025-03-07T23:31:19.678ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 7d0aed69-c965-479d-ac68-e398d857d505 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392732025-03-07T23:31:19.678ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 585 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 7d0aed69-c965-479d-ac68-e398d857d505 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392742025-03-07T23:31:19.678ZINFOtest_unauthorized (external client test context): client received response status = 401
392752025-03-07T23:31:19.678ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392762025-03-07T23:31:19.678ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392772025-03-07T23:31:19.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f173a278-06a6-485a-97f2-6bf8da214a39 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392782025-03-07T23:31:19.679ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f173a278-06a6-485a-97f2-6bf8da214a39 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392792025-03-07T23:31:19.679ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f173a278-06a6-485a-97f2-6bf8da214a39 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392802025-03-07T23:31:19.679ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 216 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f173a278-06a6-485a-97f2-6bf8da214a39 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392812025-03-07T23:31:19.679ZINFOtest_unauthorized (external client test context): client received response status = 401
392822025-03-07T23:31:19.679ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392832025-03-07T23:31:19.679ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392842025-03-07T23:31:19.679ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 498e96bd-668b-452c-a4ac-d9e0164b263d uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392852025-03-07T23:31:19.680ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 498e96bd-668b-452c-a4ac-d9e0164b263d uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392862025-03-07T23:31:19.682ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4718:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::ExternalIp>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4741:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn_env#0}, dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::ExternalIp>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_attach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>, dropshot::extractor::body::TypedBody<nexus_types::external_api::params::EphemeralIpCreate>), dropshot::handler::HttpResponseAccepted<nexus_types::external_api::views::ExternalIp>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 498e96bd-668b-452c-a4ac-d9e0164b263d uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392872025-03-07T23:31:19.682ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1402 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 498e96bd-668b-452c-a4ac-d9e0164b263d response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392882025-03-07T23:31:19.682ZINFOtest_unauthorized (external client test context): client received response status = 401
392892025-03-07T23:31:19.682ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392902025-03-07T23:31:19.682ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392912025-03-07T23:31:19.682ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392922025-03-07T23:31:19.682ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392932025-03-07T23:31:19.682ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
392942025-03-07T23:31:19.682ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392952025-03-07T23:31:19.682ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392962025-03-07T23:31:19.684ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
392972025-03-07T23:31:19.685ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
392982025-03-07T23:31:19.685ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
392992025-03-07T23:31:19.686ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393002025-03-07T23:31:19.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
393012025-03-07T23:31:19.689ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
393022025-03-07T23:31:19.689ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393032025-03-07T23:31:19.689ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393042025-03-07T23:31:19.690ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393052025-03-07T23:31:19.692ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
393062025-03-07T23:31:19.692ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393072025-03-07T23:31:19.692ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393082025-03-07T23:31:19.693ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393092025-03-07T23:31:19.695ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
393102025-03-07T23:31:19.700ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
393112025-03-07T23:31:19.700ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393122025-03-07T23:31:19.700ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393132025-03-07T23:31:19.702ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393142025-03-07T23:31:19.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
393152025-03-07T23:31:19.704ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
393162025-03-07T23:31:19.704ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393172025-03-07T23:31:19.704ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393182025-03-07T23:31:19.705ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393192025-03-07T23:31:19.707ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
393202025-03-07T23:31:19.707ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
393212025-03-07T23:31:19.707ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
393222025-03-07T23:31:19.708ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
393232025-03-07T23:31:19.711ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
393242025-03-07T23:31:19.715ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
393252025-03-07T23:31:19.715ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393262025-03-07T23:31:19.715ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393272025-03-07T23:31:19.717ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393282025-03-07T23:31:19.718ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393292025-03-07T23:31:19.722ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393302025-03-07T23:31:19.722ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393312025-03-07T23:31:19.723ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393322025-03-07T23:31:19.725ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393332025-03-07T23:31:19.726ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393342025-03-07T23:31:19.726ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393352025-03-07T23:31:19.731ZTRACtest_unauthorized (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393362025-03-07T23:31:19.732ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393372025-03-07T23:31:19.732ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393382025-03-07T23:31:19.732ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393392025-03-07T23:31:19.732ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393402025-03-07T23:31:19.739ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393412025-03-07T23:31:19.739ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393422025-03-07T23:31:19.739ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393432025-03-07T23:31:19.741ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393442025-03-07T23:31:19.745ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393452025-03-07T23:31:19.745ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393462025-03-07T23:31:19.745ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393472025-03-07T23:31:19.746ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Database result = Ok(()) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393482025-03-07T23:31:19.754ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393492025-03-07T23:31:19.780ZDEBGtest_unauthorized (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393502025-03-07T23:31:19.780ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 98254 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 758ca2c8-b444-4316-bd1d-43a42f77f36b response_code = 404 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393512025-03-07T23:31:19.781ZINFOtest_unauthorized (external client test context): client received response status = 404
393522025-03-07T23:31:19.781ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393532025-03-07T23:31:19.782ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393542025-03-07T23:31:19.788ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 69ee7cae-c41a-4830-b148-15ebbc3db992 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393552025-03-07T23:31:19.788ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 69ee7cae-c41a-4830-b148-15ebbc3db992 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393562025-03-07T23:31:19.788ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 69ee7cae-c41a-4830-b148-15ebbc3db992 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393572025-03-07T23:31:19.788ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 69ee7cae-c41a-4830-b148-15ebbc3db992 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393582025-03-07T23:31:19.788ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 815 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 69ee7cae-c41a-4830-b148-15ebbc3db992 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393592025-03-07T23:31:19.795ZINFOtest_unauthorized (external client test context): client received response status = 401
393602025-03-07T23:31:19.795ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393612025-03-07T23:31:19.795ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393622025-03-07T23:31:19.795ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 6ce72397-f46b-49b5-ad6d-e7a180c150a5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393632025-03-07T23:31:19.802ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 6ce72397-f46b-49b5-ad6d-e7a180c150a5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393642025-03-07T23:31:19.802ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 6ce72397-f46b-49b5-ad6d-e7a180c150a5 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393652025-03-07T23:31:19.802ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 6758 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 6ce72397-f46b-49b5-ad6d-e7a180c150a5 response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393662025-03-07T23:31:19.802ZINFOtest_unauthorized (external client test context): client received response status = 401
393672025-03-07T23:31:19.802ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393682025-03-07T23:31:19.802ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393692025-03-07T23:31:19.827ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 296d0ae4-bd23-43b7-bf1d-e85f6fea00da uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393702025-03-07T23:31:19.827ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 296d0ae4-bd23-43b7-bf1d-e85f6fea00da uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393712025-03-07T23:31:19.827ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:4752:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseDeleted> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:4775:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn_env#0}, dropshot::handler::HttpResponseDeleted, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ephemeral_ip_detach::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<nexus_types::external_api::params::OptionalProjectSelector>), dropshot::handler::HttpResponseDeleted> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 296d0ae4-bd23-43b7-bf1d-e85f6fea00da uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393722025-03-07T23:31:19.827ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1049 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 296d0ae4-bd23-43b7-bf1d-e85f6fea00da response_code = 401 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393732025-03-07T23:31:19.827ZINFOtest_unauthorized (external client test context): client received response status = 401
393742025-03-07T23:31:19.827ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393752025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393762025-03-07T23:31:19.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 091f3617-7295-43c5-82c0-ef1ca4e87002 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393772025-03-07T23:31:19.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 57 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 091f3617-7295-43c5-82c0-ef1ca4e87002 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393782025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client received response status = 405
393792025-03-07T23:31:19.828ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393802025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393812025-03-07T23:31:19.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 172a58f3-1215-4b67-9032-bffd1e6c2926 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393822025-03-07T23:31:19.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 94 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 172a58f3-1215-4b67-9032-bffd1e6c2926 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393832025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client received response status = 405
393842025-03-07T23:31:19.828ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393852025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393862025-03-07T23:31:19.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = a87711df-4b68-437b-9118-d134da39bf41 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393872025-03-07T23:31:19.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 54 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = a87711df-4b68-437b-9118-d134da39bf41 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393882025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client received response status = 405
393892025-03-07T23:31:19.828ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393902025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393912025-03-07T23:31:19.828ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = b1b1b404-e3ea-42c1-9430-ed2d9382ead4 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393922025-03-07T23:31:19.828ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 46 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = b1b1b404-e3ea-42c1-9430-ed2d9382ead4 response_code = 405 uri = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393932025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client received response status = 405
393942025-03-07T23:31:19.828ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/external-ips/ephemeral?project=demo-project
393952025-03-07T23:31:19.828ZINFOtest_unauthorized: test: begin endpoint url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393962025-03-07T23:31:19.828ZINFOtest_unauthorized: test: privileged GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393972025-03-07T23:31:19.828ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
393982025-03-07T23:31:19.829ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
393992025-03-07T23:31:19.829ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394002025-03-07T23:31:19.829ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394012025-03-07T23:31:19.829ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394022025-03-07T23:31:19.829ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394032025-03-07T23:31:19.829ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394042025-03-07T23:31:19.831ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394052025-03-07T23:31:19.832ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394062025-03-07T23:31:19.832ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394072025-03-07T23:31:19.848ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
394082025-03-07T23:31:19.851ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
394092025-03-07T23:31:19.851ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394102025-03-07T23:31:19.851ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394112025-03-07T23:31:19.851ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394122025-03-07T23:31:19.867ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
394132025-03-07T23:31:19.867ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394142025-03-07T23:31:19.867ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394152025-03-07T23:31:19.867ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394162025-03-07T23:31:19.868ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
394172025-03-07T23:31:19.873ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
394182025-03-07T23:31:19.873ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394192025-03-07T23:31:19.873ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394202025-03-07T23:31:19.873ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394212025-03-07T23:31:19.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
394222025-03-07T23:31:19.876ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
394232025-03-07T23:31:19.876ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394242025-03-07T23:31:19.876ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394252025-03-07T23:31:19.878ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394262025-03-07T23:31:19.888ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
394272025-03-07T23:31:19.888ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394282025-03-07T23:31:19.888ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394292025-03-07T23:31:19.888ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394302025-03-07T23:31:19.891ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
394312025-03-07T23:31:19.894ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
394322025-03-07T23:31:19.894ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394332025-03-07T23:31:19.894ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394342025-03-07T23:31:19.894ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394352025-03-07T23:31:19.895ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394362025-03-07T23:31:19.897ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394372025-03-07T23:31:19.897ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394382025-03-07T23:31:19.901ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394392025-03-07T23:31:19.906ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394402025-03-07T23:31:19.906ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394412025-03-07T23:31:19.906ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394422025-03-07T23:31:19.908ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394432025-03-07T23:31:19.908ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394442025-03-07T23:31:19.908ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394452025-03-07T23:31:19.909ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394462025-03-07T23:31:19.909ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394472025-03-07T23:31:19.919ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394482025-03-07T23:31:19.920ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394492025-03-07T23:31:19.920ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394502025-03-07T23:31:19.920ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394512025-03-07T23:31:19.923ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394522025-03-07T23:31:19.924ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394532025-03-07T23:31:19.924ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394542025-03-07T23:31:19.924ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394552025-03-07T23:31:19.929ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394562025-03-07T23:31:19.943ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394572025-03-07T23:31:19.944ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394582025-03-07T23:31:19.944ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394592025-03-07T23:31:19.944ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394602025-03-07T23:31:19.953ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 123430 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = ca835326-38c7-4fb9-a19e-88dd5b6432a9 response_code = 200 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394612025-03-07T23:31:19.953ZINFOtest_unauthorized (external client test context): client received response status = 200
394622025-03-07T23:31:19.953ZINFOtest_unauthorized: test: authenticated, unauthorized method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394632025-03-07T23:31:19.953ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
394642025-03-07T23:31:19.953ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394652025-03-07T23:31:19.953ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394662025-03-07T23:31:19.953ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 silo_user_id = 001de000-05e4-4000-8000-000000060001 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394672025-03-07T23:31:19.953ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394682025-03-07T23:31:19.953ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394692025-03-07T23:31:19.953ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394702025-03-07T23:31:19.957ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394712025-03-07T23:31:19.957ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394722025-03-07T23:31:19.960ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394732025-03-07T23:31:19.993ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) }
394742025-03-07T23:31:19.993ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
394752025-03-07T23:31:19.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394762025-03-07T23:31:19.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394772025-03-07T23:31:19.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394782025-03-07T23:31:19.994ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
394792025-03-07T23:31:19.994ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394802025-03-07T23:31:19.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394812025-03-07T23:31:19.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394822025-03-07T23:31:19.994ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
394832025-03-07T23:31:19.994ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000060001, lookup_type: ById(001de000-05e4-4000-8000-000000060001) } result = Ok(())
394842025-03-07T23:31:19.995ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394852025-03-07T23:31:19.995ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394862025-03-07T23:31:19.995ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394872025-03-07T23:31:20.006ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
394882025-03-07T23:31:20.006ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
394892025-03-07T23:31:20.006ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394902025-03-07T23:31:20.006ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394912025-03-07T23:31:20.006ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394922025-03-07T23:31:20.019ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
394932025-03-07T23:31:20.020ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
394942025-03-07T23:31:20.020ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
394952025-03-07T23:31:20.021ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
394962025-03-07T23:31:20.040ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
394972025-03-07T23:31:20.040ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
394982025-03-07T23:31:20.044ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
394992025-03-07T23:31:20.044ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395002025-03-07T23:31:20.044ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395012025-03-07T23:31:20.045ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395022025-03-07T23:31:20.047ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395032025-03-07T23:31:20.047ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395042025-03-07T23:31:20.048ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395052025-03-07T23:31:20.050ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395062025-03-07T23:31:20.050ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395072025-03-07T23:31:20.051ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395082025-03-07T23:31:20.053ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395092025-03-07T23:31:20.053ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395102025-03-07T23:31:20.053ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395112025-03-07T23:31:20.053ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395122025-03-07T23:31:20.054ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395132025-03-07T23:31:20.057ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395142025-03-07T23:31:20.057ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395152025-03-07T23:31:20.057ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395162025-03-07T23:31:20.057ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395172025-03-07T23:31:20.060ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395182025-03-07T23:31:20.060ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395192025-03-07T23:31:20.060ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395202025-03-07T23:31:20.061ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395212025-03-07T23:31:20.067ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395222025-03-07T23:31:20.119ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000060001, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000060001 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Err(ObjectNotFound { type_name: Instance, lookup_type: ByName("demo-instance") }) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395232025-03-07T23:31:20.120ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = not found: instance with name "demo-instance" error_message_internal = not found: instance with name "demo-instance" latency_us = 170450 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = dbf9061f-1ad8-48ab-bed8-ca3e9193fc20 response_code = 404 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395242025-03-07T23:31:20.120ZINFOtest_unauthorized (external client test context): client received response status = 404
395252025-03-07T23:31:20.120ZINFOtest_unauthorized: test: unauthenticated method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395262025-03-07T23:31:20.120ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395272025-03-07T23:31:20.121ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 443b1354-3a25-4305-a650-516e6fcfed5e uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395282025-03-07T23:31:20.121ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 443b1354-3a25-4305-a650-516e6fcfed5e uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395292025-03-07T23:31:20.121ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("session_cookie") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 443b1354-3a25-4305-a650-516e6fcfed5e uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395302025-03-07T23:31:20.121ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Unauthenticated, schemes_tried: [SchemeName("spoof"), SchemeName("session_cookie")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 443b1354-3a25-4305-a650-516e6fcfed5e uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395312025-03-07T23:31:20.121ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = looking up Organization by name: Actor required latency_us = 394 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 443b1354-3a25-4305-a650-516e6fcfed5e response_code = 401 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395322025-03-07T23:31:20.122ZINFOtest_unauthorized (external client test context): client received response status = 401
395332025-03-07T23:31:20.122ZINFOtest_unauthorized: test: bogus creds: bad actor method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395342025-03-07T23:31:20.122ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395352025-03-07T23:31:20.122ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 192b59d5-f7ef-4ebe-b464-c4f44ca7e2c8 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395362025-03-07T23:31:20.122ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 192b59d5-f7ef-4ebe-b464-c4f44ca7e2c8 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395372025-03-07T23:31:20.122ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: UnknownActor { actor: "Jack-Donaghy" } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 192b59d5-f7ef-4ebe-b464-c4f44ca7e2c8 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395382025-03-07T23:31:20.122ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = unknown actor "Jack-Donaghy" latency_us = 178 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 192b59d5-f7ef-4ebe-b464-c4f44ca7e2c8 response_code = 401 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395392025-03-07T23:31:20.122ZINFOtest_unauthorized (external client test context): client received response status = 401
395402025-03-07T23:31:20.122ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = GET url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395412025-03-07T23:31:20.122ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395422025-03-07T23:31:20.122ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 73f73214-9e32-4e24-80b7-c124c9857afd uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395432025-03-07T23:31:20.123ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 73f73214-9e32-4e24-80b7-c124c9857afd uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395442025-03-07T23:31:20.125ZTRACtest_unauthorized (dropshot_external): authn result: Err(Error { schemes_tried: [SchemeName("spoof")], reason: BadCredentials { actor: Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }, source: do not sell to the people on this list Stack backtrace: 0: anyhow::error::<impl anyhow::Error>::msg at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/backtrace.rs:27:14 1: anyhow::__private::format_err at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/anyhow-1.0.97/src/lib.rs:692:13 2: nexus_auth::authn::external::spoof::authn_spoof_parse_id at ./auth/src/authn/external/spoof.rs:141:21 3: {async_block#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/spoof.rs:98:15 4: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=nexus_auth::authn::external::SchemeResult> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 5: {async_fn#0}<omicron_nexus::context::ServerContext> at ./auth/src/authn/external/mod.rs:76:63 6: {async_fn#0}<omicron_nexus::context::ServerContext, omicron_nexus::context::ApiContext> at ./auth/src/authn/external/mod.rs:58:75 7: {async_block#0} at ./src/context.rs:339:68 8: {async_fn#0}<dropshot::error::HttpError, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{async_block_env#0}, omicron_nexus::context::op_context_for_external_api::{async_fn#0}::{closure_env#1}> at ./auth/src/context.rs:101:39 9: {async_fn#0} at ./src/context.rs:352:6 10: {async_block#0} at ./src/external_api/http_entrypoints.rs:2379:69 11: {async_fn#0}<omicron_nexus::context::ApiContext, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn#0}::{async_block_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SshKey>>> at /work/oxidecomputer/omicron/oximeter/instruments/src/http.rs:170:30 12: {async_fn#0} at ./src/external_api/http_entrypoints.rs:2402:14 13: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn_env#0}, omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn_env#0}, dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SshKey>>, dropshot::error::HttpError, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:664:78 14: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 15: {async_block#0}<omicron_nexus::context::ApiContext, fn(dropshot::handler::RequestContext<omicron_nexus::context::ApiContext>, dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>) -> omicron_nexus::external_api::http_entrypoints::{impl#0}::instance_ssh_public_key_list::{async_fn_env#0}, (dropshot::extractor::path::Path<nexus_types::external_api::params::InstancePath>, dropshot::extractor::query::Query<dropshot::pagination::PaginationParams<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::http_pagination::PageSelector<omicron_common::api::external::http_pagination::ScanByNameOrId<nexus_types::external_api::params::OptionalProjectSelector>, omicron_common::api::external::NameOrId>>>), dropshot::handler::HttpResponseOk<dropshot::pagination::ResultsPage<nexus_types::external_api::views::SshKey>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/handler.rs:785:16 16: poll<alloc::boxed::Box<(dyn core::future::future::Future<Output=core::result::Result<http::response::Response<dropshot::body::Body>, dropshot::handler::HandlerError>> + core::marker::Send), alloc::alloc::Global>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/future/future.rs:124:9 17: {async_block#0}<omicron_nexus::context::ApiContext> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.0/src/server.rs:937:69 18: tokio::runtime::task::core::Core<T,S>::poll::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:331:17 19: with_mut<tokio::runtime::task::core::Stage<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>>, core::task::poll::Poll<()>, tokio::runtime::task::core::{impl#6}::poll::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/loom/std/unsafe_cell.rs:16:9 20: poll<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/core.rs:320:13 21: tokio::runtime::task::harness::poll_future::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:532:19 22: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 23: do_call<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 24: __rust_try 25: try<core::task::poll::Poll<()>, core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 26: catch_unwind<core::panic::unwind_safe::AssertUnwindSafe<tokio::runtime::task::harness::poll_future::{closure_env#0}<dropshot::server::http_request_handle::{async_fn#0}::{async_block_env#0}<omicron_nexus::context::ApiContext>, alloc::sync::Arc<tokio::runtime::scheduler::current_thread::Handle, alloc::alloc::Global>>>, core::task::poll::Poll<()>> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 27: tokio::runtime::task::harness::poll_future at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:520:18 28: tokio::runtime::task::harness::Harness<T,S>::poll_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:209:27 29: tokio::runtime::task::harness::Harness<T,S>::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/harness.rs:154:15 30: tokio::runtime::task::raw::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:271:5 31: tokio::runtime::task::raw::RawTask::poll at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/raw.rs:201:18 32: tokio::runtime::task::LocalNotified<S>::run at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/task/mod.rs:449:9 33: tokio::runtime::scheduler::current_thread::CoreGuard::block_on::{{closure}}::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:770:25 34: with_budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:107:5 35: budget<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/coop.rs:73:5 36: {closure#0}<(), tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure#0}::{closure_env#1}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:43 37: tokio::runtime::scheduler::current_thread::Context::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:428:19 38: tokio::runtime::scheduler::current_thread::Context::run_task at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:364:23 39: {closure#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:769:35 40: tokio::runtime::scheduler::current_thread::CoreGuard::enter::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:68 41: tokio::runtime::context::scoped::Scoped<T>::set at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/scoped.rs:40:9 42: tokio::runtime::context::set_scheduler::{{closure}} at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:26 43: try_with<tokio::runtime::context::Context, tokio::runtime::context::set_scheduler::{closure_env#0}<(alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>), tokio::runtime::scheduler::current_thread::{impl#8}::enter::{closure_env#0}<tokio::runtime::scheduler::current_thread::{impl#8}::block_on::{closure_env#0}<core::pin::Pin<&mut core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>>>, core::option::Option<()>>>, (alloc::boxed::Box<tokio::runtime::scheduler::current_thread::Core, alloc::alloc::Global>, core::option::Option<()>)> at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:308:12 44: std::thread::local::LocalKey<T>::with at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/local.rs:272:9 45: tokio::runtime::context::set_scheduler at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context.rs:180:9 46: tokio::runtime::scheduler::current_thread::CoreGuard::enter at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:807:27 47: tokio::runtime::scheduler::current_thread::CoreGuard::block_on at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:716:19 48: {closure#0}<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:196:28 49: tokio::runtime::context::runtime::enter_runtime at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/context/runtime.rs:65:16 50: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/scheduler/current_thread/mod.rs:184:9 51: tokio::runtime::runtime::Runtime::block_on_inner at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:368:47 52: block_on<core::pin::Pin<&mut dyn core::future::future::Future<Output=()>>> at /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/tokio-1.43.0/src/runtime/runtime.rs:342:13 53: test_unauthorized at ./tests/integration_tests/unauthorized.rs:60:1 54: test_all::integration_tests::unauthorized::test_unauthorized::{{closure}} at ./tests/integration_tests/unauthorized.rs:61:64 55: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 56: core::ops::function::FnOnce::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 57: test::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:632:18 58: test::run_test_in_process::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:60 59: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 60: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 61: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 62: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 63: test::run_test_in_process at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:655:27 64: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:576:43 65: test::run_test::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/test/src/lib.rs:606:41 66: std::sys::backtrace::__rust_begin_short_backtrace at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/backtrace.rs:152:18 67: std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:564:17 68: <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/panic/unwind_safe.rs:272:9 69: std::panicking::try::do_call at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:584:40 70: std::panicking::try at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panicking.rs:547:19 71: std::panic::catch_unwind at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/panic.rs:358:14 72: std::thread::Builder::spawn_unchecked_::{{closure}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/thread/mod.rs:562:30 73: core::ops::function::FnOnce::call_once{{vtable.shim}} at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/core/src/ops/function.rs:250:5 74: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 75: <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/alloc/src/boxed.rs:1993:9 76: std::sys::pal::unix::thread::Thread::new::thread_start at /rustc/4d91de4e48198da2e33413efdcd9cd2cc0c46688/library/std/src/sys/pal/unix/thread.rs:106:17 77: _thrp_setup 78: <unknown> } }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 73f73214-9e32-4e24-80b7-c124c9857afd uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395452025-03-07T23:31:20.125ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = credentials missing or invalid error_message_internal = bad credentials for actor Actor::UserBuiltin { user_builtin_id: 22222222-2222-2222-2222-222222222222, .. }: do not sell to the people on this list latency_us = 1508 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 73f73214-9e32-4e24-80b7-c124c9857afd response_code = 401 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395462025-03-07T23:31:20.125ZINFOtest_unauthorized (external client test context): client received response status = 401
395472025-03-07T23:31:20.125ZINFOtest_unauthorized: test: authenticated, unauthorized method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395482025-03-07T23:31:20.125ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395492025-03-07T23:31:20.125ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 14f7ce3b-6c9c-4fa1-a85b-09119aa66373 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395502025-03-07T23:31:20.125ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 142 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 14f7ce3b-6c9c-4fa1-a85b-09119aa66373 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395512025-03-07T23:31:20.126ZINFOtest_unauthorized (external client test context): client received response status = 405
395522025-03-07T23:31:20.126ZINFOtest_unauthorized: test: unauthenticated method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395532025-03-07T23:31:20.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395542025-03-07T23:31:20.126ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = e5ec4604-4339-45e1-b464-291003156b46 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395552025-03-07T23:31:20.126ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 42 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = e5ec4604-4339-45e1-b464-291003156b46 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395562025-03-07T23:31:20.126ZINFOtest_unauthorized (external client test context): client received response status = 405
395572025-03-07T23:31:20.126ZINFOtest_unauthorized: test: bogus creds: bad actor method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395582025-03-07T23:31:20.126ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395592025-03-07T23:31:20.126ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 0d173b5d-b8de-4f49-96a1-449dce35b9e6 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395602025-03-07T23:31:20.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = 0d173b5d-b8de-4f49-96a1-449dce35b9e6 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395612025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client received response status = 405
395622025-03-07T23:31:20.134ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = PUT url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395632025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = PUT uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395642025-03-07T23:31:20.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = d928b64a-4c72-424a-a3f0-a1e0090abffd uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395652025-03-07T23:31:20.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = PUT remote_addr = 127.0.0.1:34346 req_id = d928b64a-4c72-424a-a3f0-a1e0090abffd response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395662025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client received response status = 405
395672025-03-07T23:31:20.134ZINFOtest_unauthorized: test: authenticated, unauthorized method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395682025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395692025-03-07T23:31:20.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 16ce09fe-de51-4914-a492-54b6ceff49ce uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395702025-03-07T23:31:20.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 44 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 16ce09fe-de51-4914-a492-54b6ceff49ce response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395712025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client received response status = 405
395722025-03-07T23:31:20.134ZINFOtest_unauthorized: test: unauthenticated method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395732025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395742025-03-07T23:31:20.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 9410e2ba-995a-4082-8c34-5179b8ec7001 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395752025-03-07T23:31:20.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 40 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = 9410e2ba-995a-4082-8c34-5179b8ec7001 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395762025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client received response status = 405
395772025-03-07T23:31:20.134ZINFOtest_unauthorized: test: bogus creds: bad actor method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395782025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395792025-03-07T23:31:20.134ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f7baa76c-391b-4c8f-8ec1-94dc26cd3e44 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395802025-03-07T23:31:20.134ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = f7baa76c-391b-4c8f-8ec1-94dc26cd3e44 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395812025-03-07T23:31:20.134ZINFOtest_unauthorized (external client test context): client received response status = 405
395822025-03-07T23:31:20.135ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = POST url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395832025-03-07T23:31:20.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395842025-03-07T23:31:20.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = ad417781-6bab-41c9-9002-f8c3911736a1 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395852025-03-07T23:31:20.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 41 local_addr = 127.0.0.1:48685 method = POST remote_addr = 127.0.0.1:34346 req_id = ad417781-6bab-41c9-9002-f8c3911736a1 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395862025-03-07T23:31:20.135ZINFOtest_unauthorized (external client test context): client received response status = 405
395872025-03-07T23:31:20.135ZINFOtest_unauthorized: test: authenticated, unauthorized method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395882025-03-07T23:31:20.135ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395892025-03-07T23:31:20.135ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 53d2de84-40e0-423b-a0d4-b45ad035093b uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395902025-03-07T23:31:20.135ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 391 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 53d2de84-40e0-423b-a0d4-b45ad035093b response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395912025-03-07T23:31:20.135ZINFOtest_unauthorized (external client test context): client received response status = 405
395922025-03-07T23:31:20.136ZINFOtest_unauthorized: test: unauthenticated method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395932025-03-07T23:31:20.136ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395942025-03-07T23:31:20.136ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 6f1cc688-99e4-4e39-bac3-af37545ae39f uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395952025-03-07T23:31:20.136ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 82 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 6f1cc688-99e4-4e39-bac3-af37545ae39f response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395962025-03-07T23:31:20.136ZINFOtest_unauthorized (external client test context): client received response status = 405
395972025-03-07T23:31:20.136ZINFOtest_unauthorized: test: bogus creds: bad actor method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
395982025-03-07T23:31:20.136ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
395992025-03-07T23:31:20.137ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = a4e64fde-c7b0-4554-912c-9c77bf328184 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396002025-03-07T23:31:20.137ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 71 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = a4e64fde-c7b0-4554-912c-9c77bf328184 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396012025-03-07T23:31:20.137ZINFOtest_unauthorized (external client test context): client received response status = 405
396022025-03-07T23:31:20.138ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = DELETE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396032025-03-07T23:31:20.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = DELETE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
396042025-03-07T23:31:20.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 3dc20f84-88ba-40f6-9e5d-aa11f7862620 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396052025-03-07T23:31:20.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 117 local_addr = 127.0.0.1:48685 method = DELETE remote_addr = 127.0.0.1:34346 req_id = 3dc20f84-88ba-40f6-9e5d-aa11f7862620 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396062025-03-07T23:31:20.138ZINFOtest_unauthorized (external client test context): client received response status = 405
396072025-03-07T23:31:20.138ZINFOtest_unauthorized: test: authenticated, unauthorized method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396082025-03-07T23:31:20.138ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
396092025-03-07T23:31:20.138ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 4bcecab7-9207-473d-88b1-cb27655c60f6 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396102025-03-07T23:31:20.138ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 4bcecab7-9207-473d-88b1-cb27655c60f6 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396112025-03-07T23:31:20.138ZINFOtest_unauthorized (external client test context): client received response status = 405
396122025-03-07T23:31:20.139ZINFOtest_unauthorized: test: unauthenticated method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396132025-03-07T23:31:20.139ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
396142025-03-07T23:31:20.139ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 08e74b47-6291-4b07-80cf-e15c615fe93b uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396152025-03-07T23:31:20.139ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 59 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 08e74b47-6291-4b07-80cf-e15c615fe93b response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396162025-03-07T23:31:20.139ZINFOtest_unauthorized (external client test context): client received response status = 405
396172025-03-07T23:31:20.139ZINFOtest_unauthorized: test: bogus creds: bad actor method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396182025-03-07T23:31:20.139ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
396192025-03-07T23:31:20.139ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 62dec29d-b6e9-4270-b894-737228263b91 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396202025-03-07T23:31:20.139ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 107 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = 62dec29d-b6e9-4270-b894-737228263b91 response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396212025-03-07T23:31:20.140ZINFOtest_unauthorized (external client test context): client received response status = 405
396222025-03-07T23:31:20.140ZINFOtest_unauthorized: test: bogus creds: bad cred syntax method = TRACE url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396232025-03-07T23:31:20.140ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = TRACE uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
396242025-03-07T23:31:20.140ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = c02908d2-4add-45b8-89d0-999db432e84e uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396252025-03-07T23:31:20.140ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Method Not Allowed error_message_internal = Method Not Allowed latency_us = 64 local_addr = 127.0.0.1:48685 method = TRACE remote_addr = 127.0.0.1:34346 req_id = c02908d2-4add-45b8-89d0-999db432e84e response_code = 405 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396262025-03-07T23:31:20.140ZINFOtest_unauthorized (external client test context): client received response status = 405
396272025-03-07T23:31:20.140ZINFOtest_unauthorized: test: compare current resource content with earlier url = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396282025-03-07T23:31:20.140ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/instances/demo-instance/ssh-public-keys?project=demo-project
396292025-03-07T23:31:20.141ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396302025-03-07T23:31:20.141ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396312025-03-07T23:31:20.141ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396322025-03-07T23:31:20.141ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396332025-03-07T23:31:20.141ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396342025-03-07T23:31:20.143ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396352025-03-07T23:31:20.148ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396362025-03-07T23:31:20.149ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396372025-03-07T23:31:20.150ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396382025-03-07T23:31:20.158ZDEBGtest_unauthorized (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
396392025-03-07T23:31:20.158ZDEBGtest_unauthorized (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
396402025-03-07T23:31:20.158ZDEBGtest_unauthorized (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72
396412025-03-07T23:31:20.161ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
396422025-03-07T23:31:20.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
396432025-03-07T23:31:20.161ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
396442025-03-07T23:31:20.161ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396452025-03-07T23:31:20.162ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396462025-03-07T23:31:20.164ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396472025-03-07T23:31:20.176ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 2 table_name = fields_string
396482025-03-07T23:31:20.177ZTRACtest_unauthorized (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
396492025-03-07T23:31:20.178ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
396502025-03-07T23:31:20.178ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396512025-03-07T23:31:20.178ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396522025-03-07T23:31:20.180ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396532025-03-07T23:31:20.183ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
396542025-03-07T23:31:20.188ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
396552025-03-07T23:31:20.189ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396562025-03-07T23:31:20.189ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396572025-03-07T23:31:20.189ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396582025-03-07T23:31:20.190ZDEBGtest_unauthorized (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 7fd32c60-af82-427f-b4b1-24210d636c72 n_rows = 1 table_name = measurements_i64
396592025-03-07T23:31:20.190ZTRACtest_unauthorized (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
396602025-03-07T23:31:20.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
396612025-03-07T23:31:20.198ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
396622025-03-07T23:31:20.198ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396632025-03-07T23:31:20.198ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396642025-03-07T23:31:20.204ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396652025-03-07T23:31:20.207ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
396662025-03-07T23:31:20.207ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
396672025-03-07T23:31:20.207ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
396682025-03-07T23:31:20.210ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
396692025-03-07T23:31:20.215ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
396702025-03-07T23:31:20.225ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
396712025-03-07T23:31:20.226ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396722025-03-07T23:31:20.226ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396732025-03-07T23:31:20.227ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396742025-03-07T23:31:20.228ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396752025-03-07T23:31:20.231ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396762025-03-07T23:31:20.231ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396772025-03-07T23:31:20.232ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396782025-03-07T23:31:20.236ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396792025-03-07T23:31:20.236ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396802025-03-07T23:31:20.237ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396812025-03-07T23:31:20.243ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396822025-03-07T23:31:20.244ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource_id = 581ba6bb-1990-42cd-9dc5-6371c2e527c7 resource_type = Project uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396832025-03-07T23:31:20.244ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396842025-03-07T23:31:20.244ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396852025-03-07T23:31:20.246ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396862025-03-07T23:31:20.250ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396872025-03-07T23:31:20.250ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396882025-03-07T23:31:20.251ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396892025-03-07T23:31:20.256ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396902025-03-07T23:31:20.266ZWARNtest_unauthorized (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
396912025-03-07T23:31:20.266ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396922025-03-07T23:31:20.267ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396932025-03-07T23:31:20.267ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396942025-03-07T23:31:20.268ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396952025-03-07T23:31:20.274ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396962025-03-07T23:31:20.285ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 581ba6bb-1990-42cd-9dc5-6371c2e527c7, lookup_type: ByName("demo-project") }, key: 2576a7b3-a8c6-4f29-a8f3-7b96f0ca7efc, lookup_type: ByName("demo-instance") } result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396972025-03-07T23:31:20.285ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396982025-03-07T23:31:20.285ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 roles = RoleSet { roles: {} } uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
396992025-03-07T23:31:20.285ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 resource = Database result = Ok(()) uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
397002025-03-07T23:31:20.289ZINFOtest_unauthorized (dropshot_external): request completed latency_us = 148170 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 7acd68eb-b16a-48f6-8fd0-fccc717a0d86 response_code = 200 uri = /v1/instances/demo-instance/ssh-public-keys?project=demo-project
397012025-03-07T23:31:20.291ZINFOtest_unauthorized (external client test context): client received response status = 200
397022025-03-07T23:31:20.291ZINFOtest_unauthorized: test: begin endpoint url = /v1/system/roles
397032025-03-07T23:31:20.291ZINFOtest_unauthorized: test: privileged GET url = /v1/system/roles
397042025-03-07T23:31:20.291ZINFOtest_unauthorized (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:48685/v1/system/roles
397052025-03-07T23:31:20.292ZTRACtest_unauthorized (dropshot_external): incoming request local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e uri = /v1/system/roles
397062025-03-07T23:31:20.292ZTRACtest_unauthorized (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e uri = /v1/system/roles
397072025-03-07T23:31:20.292ZDEBGtest_unauthorized (dropshot_external): looking up silo for user local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/roles
397082025-03-07T23:31:20.292ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397092025-03-07T23:31:20.292ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397102025-03-07T23:31:20.292ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397112025-03-07T23:31:20.296ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397122025-03-07T23:31:20.296ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397132025-03-07T23:31:20.297ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397142025-03-07T23:31:20.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
397152025-03-07T23:31:20.300ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
397162025-03-07T23:31:20.300ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397172025-03-07T23:31:20.301ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397182025-03-07T23:31:20.301ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397192025-03-07T23:31:20.312ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
397202025-03-07T23:31:20.312ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397212025-03-07T23:31:20.312ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397222025-03-07T23:31:20.313ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397232025-03-07T23:31:20.316ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
397242025-03-07T23:31:20.321ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
397252025-03-07T23:31:20.322ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397262025-03-07T23:31:20.322ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397272025-03-07T23:31:20.322ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397282025-03-07T23:31:20.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
397292025-03-07T23:31:20.325ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
397302025-03-07T23:31:20.325ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397312025-03-07T23:31:20.325ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397322025-03-07T23:31:20.326ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397332025-03-07T23:31:20.329ZTRACtest_unauthorized (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
397342025-03-07T23:31:20.329ZTRACtest_unauthorized (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
397352025-03-07T23:31:20.329ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {} }
397362025-03-07T23:31:20.330ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
397372025-03-07T23:31:20.334ZDEBGtest_unauthorized (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
397382025-03-07T23:31:20.339ZDEBGtest_unauthorized (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
397392025-03-07T23:31:20.339ZTRACtest_unauthorized (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e uri = /v1/system/roles
397402025-03-07T23:31:20.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource = Fleet uri = /v1/system/roles
397412025-03-07T23:31:20.339ZTRACtest_unauthorized (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/roles
397422025-03-07T23:31:20.339ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource = Database uri = /v1/system/roles
397432025-03-07T23:31:20.339ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e roles = RoleSet { roles: {} } uri = /v1/system/roles
397442025-03-07T23:31:20.339ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource = Database result = Ok(()) uri = /v1/system/roles
397452025-03-07T23:31:20.346ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/roles
397462025-03-07T23:31:20.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource = Fleet result = Ok(()) uri = /v1/system/roles
397472025-03-07T23:31:20.351ZTRACtest_unauthorized (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource = Database uri = /v1/system/roles
397482025-03-07T23:31:20.351ZDEBGtest_unauthorized (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e roles = RoleSet { roles: {} } uri = /v1/system/roles
397492025-03-07T23:31:20.351ZDEBGtest_unauthorized (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e resource = Database result = Ok(()) uri = /v1/system/roles
397502025-03-07T23:31:20.360ZINFOtest_unauthorized (dropshot_external): request completed error_message_external = Internal Server Error error_message_internal = unexpected database error: column "resource_type" does not exist latency_us = 68588 local_addr = 127.0.0.1:48685 method = GET remote_addr = 127.0.0.1:34346 req_id = 503ce4ef-46ed-41f8-bc5e-49b3e0150a8e response_code = 500 uri = /v1/system/roles
397512025-03-07T23:31:20.361ZINFOtest_unauthorized (external client test context): client received response status = 500